@gabrielhicks/solv 5.2.25 → 5.2.27
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.js +19 -19
- package/dist/index.js.map +1 -1
- package/package.json +1 -1
package/dist/index.js
CHANGED
|
@@ -1,10 +1,10 @@
|
|
|
1
1
|
#!/usr/bin/env node
|
|
2
|
-
var Oi=Object.defineProperty;var r=(t,e)=>Oi(t,"name",{value:e,configurable:!0});import"dotenv/config";import{Command as zd}from"commander";var or="5.2.25";var rr={name:"@gabrielhicks/solv",version:or,description:"Solana Validator CLI SOLV",main:"dist/index.js",type:"module",repository:"https://github.com/gabrielhicks/solv",keywords:["solana","validator","cli","validator-tool","Node.js","web3"],files:["dist"],author:"ELSOUL LABO B.V.",private:!1,license:"Apache-2.0",bin:{solv:"./dist/index.js"},scripts:{test:"vitest",build:"tsup src/index.ts && npx tsx add-line.ts",dev:"nodemon",start:"node dist/index.js"},dependencies:{"@jup-ag/api":"6.0.27","@metaplex-foundation/mpl-token-metadata":"3.2.1","@metaplex-foundation/umi":"0.9.2","@metaplex-foundation/umi-bundle-defaults":"0.9.2","@skeet-framework/utils":"1.3.11","@solana/spl-stake-pool":"1.1.5","@solana/spl-token":"0.4.8","@solana/web3.js":"1.95.4","bigint-buffer":"1.1.5","bn.js":"5.2.1",bs58:"6.0.0",chalk:"5.3.0","chalk-pipe":"6.1.0","cli-progress":"3.12.0","cli-spinner":"0.2.10","cli-table3":"0.6.5",commander:"12.1.0",dotenv:"16.4.5",inquirer:"10.2.0","node-fetch":"3.3.2",prompt:"1.3.0"},devDependencies:{"@changesets/changelog-github":"0.5.0","@changesets/cli":"2.27.7","@solana-developers/helpers":"^2.5.6","@swc/core":"1.7.21","@types/bn.js":"5.1.5","@types/cli-progress":"3.11.6","@types/cli-spinner":"0.2.3","@types/inquirer":"9.0.7","@types/node":"22.5.1","@types/node-fetch":"2.6.11","@types/prompt":"1.1.8","@typescript-eslint/eslint-plugin":"8.3.0","@typescript-eslint/parser":"8.3.0",eslint:"9.9.1","eslint-config-prettier":"9.1.0",nodemon:"3.1.7",prettier:"3.3.3",tsup:"8.2.4",typescript:"5.5.4",vite:"5.4.2","vite-tsconfig-paths":"5.0.1",vitest:"2.0.5"}};var Te=rr.version;var Qt="https://validators.solutions";var Ee="solv4.config.json";var At="identity.json",wt="unstaked-identity.json",nr="relayer-keypair.json",Ci="mainnet-validator-keypair.json",Ii="mainnet-vote-account-keypair.json",Li="mainnet-authority-keypair.json",Pi="testnet-validator-keypair.json",xi="testnet-vote-account-keypair.json",Vi="testnet-authority-keypair.json",P="/home/solv",R=`${P}/${At}`,nu=`${P}/${wt}`,b=`${P}/${Ci}`,ge=`${P}/${Ii}`,su=`${P}/${Li}`,x=`${P}/${Pi}`,Ae=`${P}/${xi}`,au=`${P}/${Vi}`,z=`${P}/solana-validator.log`,et=P+"/start-validator.sh",w="/mnt/ledger",It="/mnt/accounts",ot="/mnt/snapshots",sr="solana-validator",ar="agave-validator",ir="ELLB9W7ZCwRCV3FzWcCWoyKP6NjZJKArLyGtkqefnHcG";var we=3,lr="https://api.testnet.solana.com",cr="https://api.mainnet-beta.solana.com",mr="https://verify.validators.solutions/solv-migrate",pr="https://jup.validators.solutions/v1/jup",_o;(function(t){t.SOL="SOL",t.USDC="USDC",t.elSOL="elSOL",t.JitoSOL="JitoSOL",t.mSOL="mSOL",t.bSOL="bSOL",t.EPCT="EPCT",t.JUP="JUP",t.BONK="BONK",t.JTO="JTO"})(_o||(_o={}));var dr=Object.values(_o),_e="So11111111111111111111111111111111111111112",Ne="EPjFWdd5AufqSSqeM2qN1xzybapC8G4wEGGkZwyTDt1v",No="ELSoL1owwMWQ9foMsutweCsMKbTPVBD9pFqxQGidTaMC";var ur="SOLV420",fr={So11111111111111111111111111111111111111112:"4Vwkpk3DTVrTGnUQTazsgQ1wxtU9QwZTmAXDaQRHg9Ra",EPjFWdd5AufqSSqeM2qN1xzybapC8G4wEGGkZwyTDt1v:"J8sqx9ZEoPRqboFAXK3c1R38zm41tRNJgUn2FzyeYQDj",J1toso1uCk3RLmjorhTtrVwY9HJ7X8V9yYac6Y7kGCPn:"HPj87TFMPZfm5nk1HmTH9a382RXn7h9oWftiFr3Xs12a",mSoLzYCxHdYgdzU16g5QSh3i5K3z3KZK7ytfqcJm7So:"8CX5tE9KvJ59HcoXwWf6tCZoRuz2JFSmunnbKC1ryaK9",bSo13r4TkiE4KumL71LsHTPpL2euBYLFx6h9HP3piy1:"782MdvLby3VfvKdfDYn9tX3DfNAtg7TcytNNFuepcoMH",CvB1ztJvpYQPvdPBePtRzjL4aQidjydtUz61NWgcgQtP:"BhR2L6J5q3xF1TxReXyHjaUh4MF6qV99tMsipzPAKeB",JUPyiwrYJFskUPiHa7hkeR8VUtAeFoSYbKedZNsDvCN:"212yg3Ev7khq4p1mESFGenF4nWefmkbC8f7mHM68j4vg",DezXAZ8z7PnrnRJjz3wXBoRgixCa6xjnB7YaB1pPB263:"61Ndjv9392jPRVGALdYgjjxGYa6TT6Gn2WLDSsmugE6U",jtojtomepa8beP8AuQc6eXt5FriJwfFMwQx2v2f9mCL:"2c9qVh8RQ6j2E2VdAEcCrRXMrd6g1vvPNZvAR6sbaGWo"};import{spawnSync as bi}from"child_process";import{spawnSync as hr}from"node:child_process";var $i=r((t,e=!1)=>{e?hr(`sh -c "$(curl --netrc-optional -sSfL https://raw.githubusercontent.com/gabrielhicks/agave/v${t}-mod/installer)"`,{shell:!0,stdio:"inherit"}):hr(`sh -c "$(curl --netrc-optional -sSfL https://release.anza.xyz/v${t}/install)"`,{shell:!0,stdio:"inherit"})},"installAgave"),Lt=$i;var yr="agave-validator",Di=r(()=>{try{return yr}catch(t){return console.error(t),yr}},"getSolanaCLI"),rt=Di;var ve=r(async(t,e=!1)=>{Lt(t,e)},"updateVersion"),Re=r(async(t,e=!1,o=10)=>{let n=rt(),s=`${n} --ledger ${w} exit --max-delinquent-stake ${t} --monitor --min-idle-time ${o}`;e&&(s=`${n} --ledger ${w} exit --max-delinquent-stake ${t} --min-idle-time ${o}`),bi(s,{shell:!0,stdio:"inherit"})},"monitorUpdate");import ln from"chalk";var _t;(function(t){t.EN="en",t.JA="ja"})(_t||(_t={}));var Sr;(function(t){t[t.DOUBLE=0]="DOUBLE",t[t.SINGLE=1]="SINGLE",t[t.TRIPLE=2]="TRIPLE"})(Sr||(Sr={}));var Tr;(function(t){t.SINGLE="single",t.DOUBLE="double",t.TRIPLE="triple"})(Tr||(Tr={}));var ft;(function(t){t.MAINNET="mainnet-beta",t.TESTNET="testnet"})(ft||(ft={}));var Er;(function(t){t.VALIDATOR="validator",t.RPC="rpc"})(Er||(Er={}));var gr;(function(t){t.SOLANA="solana",t.JITO="jito",t.AGAVE="agave",t.FIREDANCER="firedancer"})(gr||(gr={}));var Ar;(function(t){t.CO_HOST_RELAYER="co-host-relayer",t.SEPARATED_RELAYER="separated-relayer",t.WITHOUT_RELAYER="without-relayer"})(Ar||(Ar={}));var wr;(function(t){t.FIREDANCER="firedancer",t.FRANKENDANCER="frankendancer"})(wr||(wr={}));var Oe;(function(t){t[t.TESTNET_VALIDATOR=0]="TESTNET_VALIDATOR",t[t.MAINNET_VALIDATOR=1]="MAINNET_VALIDATOR",t[t.RPC_NODE=2]="RPC_NODE"})(Oe||(Oe={}));var ke;(function(t){t.SOLANA_CLIENT="SolanaClient",t.JITO_MEV="JitoMev",t.FIREDANCER="Firedancer"})(ke||(ke={}));var vr=!1,Rr=!0,Or=!1,kr=!1,j={ID:"solv",LANG:_t.EN,USERNAME:"solv",TESTNET_SOLANA_VERSION:"2.2.20",MAINNET_SOLANA_VERSION:"2.2.20",NODE_VERSION:"20.17.0",TESTNET_DELINQUENT_STAKE:5,MAINNET_DELINQUENT_STAKE:5,COMMISSION:5,SOLANA_NETWORK:"testnet",SOLV_TYPE:0,DISK_TYPES:1,IS_SETUP:!1,LANG_SETUP:!1,DEFAULT_VALIDATOR_VOTE_ACCOUNT_PUBKEY:"ELLB9W7ZCwRCV3FzWcCWoyKP6NjZJKArLyGtkqefnHcG",IS_CLIENT:!1,VALIDATOR_IPS:[],MAINNET_TYPE:"SolanaClient",LEDGER_PATH:"/mnt/ledger",STAKE_ACCOUNT:[],HARVEST_ACCOUNT:"",IS_MEV_MODE:!1,RPC_URL:"https://mainnet-beta.solana.com",KEYPAIR_PATH:"/home/solv/testnet-validator-keypair.json",DISCORD_WEBHOOK_URL:"",AUTO_UPDATE:!1,AUTO_RESTART:!1,ACCOUNTS_PATH:"/mnt/accounts",SNAPSHOTS_PATH:"/mnt/snapshots",MOD:!1},K={ROOT:"/home/solv",AUTHORIZED_KEYS:"/home/solv/.ssh/authorized_keys"},_={ROOT:"/mnt",ACCOUNTS:"/mnt/accounts",LEDGER:"/mnt/ledger",SNAPSHOTS:"/mnt/snapshots"},nt={LOG:"solana-validator.log",STARTUP_SCRIPT:"start-validator.sh",CONFIG:"solv.config.json",JITO_CONFIG:"jito.config.json"},C={SOL_SERVICE:"/etc/systemd/system/solv.service",SOL_LOGROTATE:"/etc/logrotate.d/solana",FRANKENDANCER_LOGROTATE:"/etc/logrotate.d/frankendancer",SOL_SYSTEM_CONFIG21:"/etc/sysctl.d/21-solana-validator.conf",SOL_NOFILES_CONF:"/etc/security/limits.d/90-solana-nofiles.conf",SOL_SYSTEM_CONF:"/etc/systemd/system.conf",SOLANA_PATH:"/home/solv/.local/share/solana/install"},I={MAINNET_VALIDATOR_KEY:"mainnet-validator-keypair.json",MAINNET_VALIDATOR_VOTE_KEY:"mainnet-vote-account-keypair.json",MAINNET_VALITATOR_AUTHORITY_KEY:"mainnet-authority-keypair.json",TESTNET_VALIDATOR_KEY:"testnet-validator-keypair.json",TESTNET_VALIDATOR_VOTE_KEY:"testnet-vote-account-keypair.json",TESTNET_VALITATOR_AUTHORITY_KEY:"testnet-authority-keypair.json"},N=r((t=K.ROOT)=>{let e=t===K.ROOT?K.ROOT:t,o=`${e}/${I.MAINNET_VALIDATOR_KEY}`,n=`${e}/${I.MAINNET_VALIDATOR_VOTE_KEY}`,s=`${e}/${I.MAINNET_VALITATOR_AUTHORITY_KEY}`,a=`${e}/${I.TESTNET_VALIDATOR_KEY}`,i=`${e}/${I.TESTNET_VALIDATOR_VOTE_KEY}`,l=`${e}/${I.TESTNET_VALITATOR_AUTHORITY_KEY}`;return{mainnetValidatorKey:o,mainnetValidatorVoteKey:n,mainnetValidatorAuthorityKey:s,testnetValidatorKey:a,testnetValidatorVoteKey:i,testnetValidatorAuthorityKey:l}},"getAllKeyPaths"),ht=r((t=!0)=>{let e=t?`${K.ROOT}/${I.TESTNET_VALIDATOR_KEY}`:`${K.ROOT}/${I.MAINNET_VALIDATOR_KEY}`,o=t?`${K.ROOT}/${I.TESTNET_VALIDATOR_VOTE_KEY}`:`${K.ROOT}/${I.MAINNET_VALIDATOR_VOTE_KEY}`,n=`${K.ROOT}/${nt.LOG}`,s=_.ACCOUNTS,a=_.LEDGER,i=_.SNAPSHOTS,l=`${K.ROOT}/${nt.STARTUP_SCRIPT}`;return{identity:e,voteAccount:o,log:n,accounts:s,ledger:a,scriptPath:l,snapshots:i}},"startupScriptPaths");var Z="So1vW4Bm6ZURzJJHZy1JpsjoVY68z4cDgF4tTLwYMa5",vo="7tAfLKgRVd9eywSQPuMbVNd51KGkaveZQuTjapL74Fwv",Cr="EiwSTx1Z2uJATDut682U7xzzquFR4UpQJUij3wSxVoSV",Ir=9,st="ELSoL1owwMWQ9foMsutweCsMKbTPVBD9pFqxQGidTaMC",Lr="So11111111111111111111111111111111111111112",Pr="EPjFWdd5AufqSSqeM2qN1xzybapC8G4wEGGkZwyTDt1v",xr="CvB1ztJvpYQPvdPBePtRzjL4aQidjydtUz61NWgcgQtP",_r;(function(t){t[t.ELSOL=st]="ELSOL",t[t.SOL=Lr]="SOL",t[t.USDC=Pr]="USDC",t[t.EPCT=xr]="EPCT"})(_r||(_r={}));var Nr;(function(t){t.V6_BASE_URL="https://quote-api.jup.ag/v6",t.V6_QUOTE_URL="https://quote-api.jup.ag/v6/quote",t.V6_SWAP_URL="https://quote-api.jup.ag/v6/swap"})(Nr||(Nr={}));var Au={[Lr]:9,[st]:9,[Pr]:6,[xr]:6},Ce="/home/solv/currentEpoch.json",Ro=.5,Ie="https://api.testnet.solana.com";import{spawnSync as Oo}from"child_process";var Vr=r(()=>{Oo("pnpm add -g pnpm",{shell:!0,stdio:"inherit"});let t=j.NODE_VERSION;Oo(`pnpm env use ${t} --global`,{shell:!0,stdio:"inherit"}),Oo("pnpm add -g @gabrielhicks/solv",{shell:!0,stdio:"inherit"})},"updateSolv");var ct={version:"2.2.20",tag:"v2.2.20",commissionBps:1e3,relayerUrl:"http://frankfurt.mainnet.relayer.jito.wtf:8100",blockEngineUrl:"https://frankfurt.mainnet.block-engine.jito.wtf",shredReceiverAddr:"64.130.50.14:1002"},Xt={TESTNET:{Dallas:{BLOCK_ENGINE_URL:"https://dallas.testnet.block-engine.jito.wtf",RELAYER_URL:"http://dallas.testnet.relayer.jito.wtf:8100",SHRED_RECEIVER_ADDR:"141.98.218.12:1002"},NewYork:{BLOCK_ENGINE_URL:"https://ny.testnet.block-engine.jito.wtf",RELAYER_URL:"http://ny.testnet.relayer.jito.wtf:8100",SHRED_RECEIVER_ADDR:"64.130.35.224:1002"}},MAINNET:{Amsterdam:{BLOCK_ENGINE_URL:"https://amsterdam.mainnet.block-engine.jito.wtf",RELAYER_URL:"http://amsterdam.mainnet.relayer.jito.wtf:8100",SHRED_RECEIVER_ADDR:"74.118.140.240:1002"},London:{BLOCK_ENGINE_URL:"https://london.mainnet.block-engine.jito.wtf",RELAYER_URL:"http://london.mainnet.relayer.jito.wtf:8100",SHRED_RECEIVER_ADDR:"142.91.127.175:1002"},Frankfurt:{BLOCK_ENGINE_URL:"https://frankfurt.mainnet.block-engine.jito.wtf",RELAYER_URL:"http://frankfurt.mainnet.relayer.jito.wtf:8100",SHRED_RECEIVER_ADDR:"64.130.50.14:1002"},NewYork:{BLOCK_ENGINE_URL:"https://ny.mainnet.block-engine.jito.wtf",RELAYER_URL:"http://ny.mainnet.relayer.jito.wtf:8100",SHRED_RECEIVER_ADDR:"141.98.216.96:1002"},Tokyo:{BLOCK_ENGINE_URL:"https://tokyo.mainnet.block-engine.jito.wtf",RELAYER_URL:"http://tokyo.mainnet.relayer.jito.wtf:8100",SHRED_RECEIVER_ADDR:"202.8.9.160:1002"},SaltLakeCity:{BLOCK_ENGINE_URL:"https://slc.mainnet.block-engine.jito.wtf",RELAYER_URL:"http://slc.mainnet.relayer.jito.wtf:8100",SHRED_RECEIVER_ADDR:"64.130.53.8:1002"},Singapore:{BLOCK_ENGINE_URL:"https://singapore.mainnet.block-engine.jito.wtf",RELAYER_URL:"http://singapore.mainnet.relayer.jito.wtf:8100",SHRED_RECEIVER_ADDR:"202.8.11.224:1002"}}};import{spawnSync as $r}from"child_process";var Le=r((t=ct.tag,e=!1)=>{e?$r(`sh -c "$(curl --netrc-optional -sSfL https://raw.githubusercontent.com/gabrielhicks/jito-solana/${t}-mod/installer)"`,{shell:!0,stdio:"inherit"}):$r(`sh -c "$(curl --netrc-optional -sSfL https://release.jito.wtf/${t}-jito/install)"`,{shell:!0,stdio:"inherit"})},"jitoUpdate");import{readFile as Ki,writeFile as Ui}from"fs/promises";import{homedir as Mi}from"os";var Zt=r(async t=>{let o=`${Mi()}/${nt.JITO_CONFIG}`,s={...JSON.parse(await Ki(o,"utf8")),...t},a=JSON.stringify(s,null,2);await Ui(o,a),console.log(`Updated ${o} with new values.`)},"updateJitoSolvConfig");import{spawnSync as Dr}from"child_process";import Hi from"inquirer";var br=r((t,e=!0)=>{let o=e?"/home/solv/testnet-validator-keypair.json":"/home/solv/mainnet-validator-keypair.json",n=e?"/home/solv/testnet-vote-account-keypair.json":"/home/solv/mainnet-vote-account-keypair.json";Dr(`solana config set --url ${e?"testnet":"mainnet-beta"} --keypair ${o}`,{shell:!0,stdio:"inherit"});let a=`solana vote-update-commission ${n} ${t} ${o} --keypair ${o}`;Dr(a,{shell:!0,stdio:"inherit"})},"updateCommission"),Kr=r(async()=>await Hi.prompt([{type:"number",name:"commission",message:"Enter new commission",default:7}]),"updateCommissionAsk");import{execAsync as te}from"@skeet-framework/utils";import Fi from"chalk";import Yi from"inquirer";var Ur=r(async()=>{let t=await Yi.prompt([{name:"ip",type:"input",message:"Enter your IP address to allow access to RPC NODE:",default:"1.2.3.4"}]);await te("sudo ufw delete allow 8899/udp"),await te("sudo ufw delete allow 8899/tcp"),await te(`sudo ufw allow from ${t.ip} to any port 8899 proto tcp`),await te(`sudo ufw allow from ${t.ip} to any port 8899 proto udp`),await te("sudo ufw reload"),console.log(Fi.white("\u2714\uFE0F Firewall updated!"))},"updateFirewall");var ji=r(()=>or,"getSolvVersion"),Pt=ji;import{readFile as Ji,writeFile as zi}from"fs/promises";import{existsAsync as Wi}from"@skeet-framework/utils";var ko;(function(t){t.EN="en",t.JA="ja"})(ko||(ko={}));var Wu=Object.values(ko),f;(function(t){t.MAINNET="mainnet-beta",t.TESTNET="testnet"})(f||(f={}));var Mr=Object.values(f),A;(function(t){t.RPC="rpc",t.VALIDATOR="validator"})(A||(A={}));var Hr=Object.values(A),T;(function(t){t.SOLANA="solana",t.AGAVE="agave",t.JITO="jito",t.FRANKENDANCER="frankendancer",t.NONE="none"})(T||(T={}));var qu=Object.values(T).filter(t=>t!=="none"),D;(function(t){t.AGAVE="agave",t.JITO="jito",t.NONE="none"})(D||(D={}));var Fr=Object.values(D).filter(t=>t!=="none"),G;(function(t){t.SINGLE="single",t.DOUBLE="double",t.TRIPLE="triple"})(G||(G={}));var B="2.2.20",U="2.2.20",Nt="2.2.20",ee="2.2.20",Yr="2.2.20",vt="2.2.20";var jr="20.17.0",xt="0.603.20216",Vt="0.603.20216";var Bi={NETWORK:f.TESTNET,NODE_TYPE:A.RPC,VALIDATOR_TYPE:T.NONE,RPC_TYPE:D.AGAVE,MNT_DISK_TYPE:G.TRIPLE,TESTNET_SOLANA_VERSION:B,MAINNET_SOLANA_VERSION:U,NODE_VERSION:jr,TESTNET_DELINQUENT_STAKE:5,MAINNET_DELINQUENT_STAKE:5,COMMISSION:5,DEFAULT_VALIDATOR_VOTE_ACCOUNT_PUBKEY:ir,STAKE_ACCOUNTS:[],HARVEST_ACCOUNT:"",IS_MEV_MODE:!1,RPC_URL:cr,KEYPAIR_PATH:"",DISCORD_WEBHOOK_URL:"",AUTO_UPDATE:!1,AUTO_RESTART:!1,IS_DUMMY:!1,API_KEY:"",LEDGER_PATH:w,ACCOUNTS_PATH:It,SNAPSHOTS_PATH:ot,MOD:!1},mt=Bi;import{homedir as qi}from"os";var Qi=r(async()=>{let e=`${qi()}/${Ee}`;return await Wi(e)?JSON.parse(await Ji(e,"utf-8")):(console.log("Creating default config file at",e),await zi(e,JSON.stringify(mt,null,2)),mt)},"readConfig"),V=Qi;import Xi from"node-fetch";var W=r(async t=>{try{let e=await V();if(e.DISCORD_WEBHOOK_URL==="")throw new Error(`DISCORD_WEBHOOK_URL is empty
|
|
2
|
+
var Oi=Object.defineProperty;var r=(t,e)=>Oi(t,"name",{value:e,configurable:!0});import"dotenv/config";import{Command as zd}from"commander";var or="5.2.27";var rr={name:"@gabrielhicks/solv",version:or,description:"Solana Validator CLI SOLV",main:"dist/index.js",type:"module",repository:"https://github.com/gabrielhicks/solv",keywords:["solana","validator","cli","validator-tool","Node.js","web3"],files:["dist"],author:"ELSOUL LABO B.V.",private:!1,license:"Apache-2.0",bin:{solv:"./dist/index.js"},scripts:{test:"vitest",build:"tsup src/index.ts && npx tsx add-line.ts",dev:"nodemon",start:"node dist/index.js"},dependencies:{"@jup-ag/api":"6.0.27","@metaplex-foundation/mpl-token-metadata":"3.2.1","@metaplex-foundation/umi":"0.9.2","@metaplex-foundation/umi-bundle-defaults":"0.9.2","@skeet-framework/utils":"1.3.11","@solana/spl-stake-pool":"1.1.5","@solana/spl-token":"0.4.8","@solana/web3.js":"1.95.4","bigint-buffer":"1.1.5","bn.js":"5.2.1",bs58:"6.0.0",chalk:"5.3.0","chalk-pipe":"6.1.0","cli-progress":"3.12.0","cli-spinner":"0.2.10","cli-table3":"0.6.5",commander:"12.1.0",dotenv:"16.4.5",inquirer:"10.2.0","node-fetch":"3.3.2",prompt:"1.3.0"},devDependencies:{"@changesets/changelog-github":"0.5.0","@changesets/cli":"2.27.7","@solana-developers/helpers":"^2.5.6","@swc/core":"1.7.21","@types/bn.js":"5.1.5","@types/cli-progress":"3.11.6","@types/cli-spinner":"0.2.3","@types/inquirer":"9.0.7","@types/node":"22.5.1","@types/node-fetch":"2.6.11","@types/prompt":"1.1.8","@typescript-eslint/eslint-plugin":"8.3.0","@typescript-eslint/parser":"8.3.0",eslint:"9.9.1","eslint-config-prettier":"9.1.0",nodemon:"3.1.7",prettier:"3.3.3",tsup:"8.2.4",typescript:"5.5.4",vite:"5.4.2","vite-tsconfig-paths":"5.0.1",vitest:"2.0.5"}};var Te=rr.version;var Qt="https://validators.solutions";var Ee="solv4.config.json";var At="identity.json",wt="unstaked-identity.json",nr="relayer-keypair.json",Ci="mainnet-validator-keypair.json",Ii="mainnet-vote-account-keypair.json",Li="mainnet-authority-keypair.json",Pi="testnet-validator-keypair.json",xi="testnet-vote-account-keypair.json",Vi="testnet-authority-keypair.json",P="/home/solv",R=`${P}/${At}`,nu=`${P}/${wt}`,b=`${P}/${Ci}`,ge=`${P}/${Ii}`,su=`${P}/${Li}`,x=`${P}/${Pi}`,Ae=`${P}/${xi}`,au=`${P}/${Vi}`,W=`${P}/solana-validator.log`,et=P+"/start-validator.sh",w="/mnt/ledger",It="/mnt/accounts",ot="/mnt/snapshots",sr="solana-validator",ar="agave-validator",ir="ELLB9W7ZCwRCV3FzWcCWoyKP6NjZJKArLyGtkqefnHcG";var we=3,lr="https://api.testnet.solana.com",cr="https://api.mainnet-beta.solana.com",mr="https://verify.validators.solutions/solv-migrate",pr="https://jup.validators.solutions/v1/jup",_o;(function(t){t.SOL="SOL",t.USDC="USDC",t.elSOL="elSOL",t.JitoSOL="JitoSOL",t.mSOL="mSOL",t.bSOL="bSOL",t.EPCT="EPCT",t.JUP="JUP",t.BONK="BONK",t.JTO="JTO"})(_o||(_o={}));var dr=Object.values(_o),_e="So11111111111111111111111111111111111111112",Ne="EPjFWdd5AufqSSqeM2qN1xzybapC8G4wEGGkZwyTDt1v",No="ELSoL1owwMWQ9foMsutweCsMKbTPVBD9pFqxQGidTaMC";var ur="SOLV420",fr={So11111111111111111111111111111111111111112:"4Vwkpk3DTVrTGnUQTazsgQ1wxtU9QwZTmAXDaQRHg9Ra",EPjFWdd5AufqSSqeM2qN1xzybapC8G4wEGGkZwyTDt1v:"J8sqx9ZEoPRqboFAXK3c1R38zm41tRNJgUn2FzyeYQDj",J1toso1uCk3RLmjorhTtrVwY9HJ7X8V9yYac6Y7kGCPn:"HPj87TFMPZfm5nk1HmTH9a382RXn7h9oWftiFr3Xs12a",mSoLzYCxHdYgdzU16g5QSh3i5K3z3KZK7ytfqcJm7So:"8CX5tE9KvJ59HcoXwWf6tCZoRuz2JFSmunnbKC1ryaK9",bSo13r4TkiE4KumL71LsHTPpL2euBYLFx6h9HP3piy1:"782MdvLby3VfvKdfDYn9tX3DfNAtg7TcytNNFuepcoMH",CvB1ztJvpYQPvdPBePtRzjL4aQidjydtUz61NWgcgQtP:"BhR2L6J5q3xF1TxReXyHjaUh4MF6qV99tMsipzPAKeB",JUPyiwrYJFskUPiHa7hkeR8VUtAeFoSYbKedZNsDvCN:"212yg3Ev7khq4p1mESFGenF4nWefmkbC8f7mHM68j4vg",DezXAZ8z7PnrnRJjz3wXBoRgixCa6xjnB7YaB1pPB263:"61Ndjv9392jPRVGALdYgjjxGYa6TT6Gn2WLDSsmugE6U",jtojtomepa8beP8AuQc6eXt5FriJwfFMwQx2v2f9mCL:"2c9qVh8RQ6j2E2VdAEcCrRXMrd6g1vvPNZvAR6sbaGWo"};import{spawnSync as bi}from"child_process";import{spawnSync as hr}from"node:child_process";var $i=r((t,e=!1)=>{e?hr(`sh -c "$(curl --netrc-optional -sSfL https://raw.githubusercontent.com/gabrielhicks/agave/v${t}-mod/installer)"`,{shell:!0,stdio:"inherit"}):hr(`sh -c "$(curl --netrc-optional -sSfL https://release.anza.xyz/v${t}/install)"`,{shell:!0,stdio:"inherit"})},"installAgave"),Lt=$i;var yr="agave-validator",Di=r(()=>{try{return yr}catch(t){return console.error(t),yr}},"getSolanaCLI"),rt=Di;var ve=r(async(t,e=!1)=>{Lt(t,e)},"updateVersion"),Re=r(async(t,e=!1,o=10)=>{let n=rt(),s=`${n} --ledger ${w} exit --max-delinquent-stake ${t} --monitor --min-idle-time ${o}`;e&&(s=`${n} --ledger ${w} exit --max-delinquent-stake ${t} --min-idle-time ${o}`),bi(s,{shell:!0,stdio:"inherit"})},"monitorUpdate");import ln from"chalk";var _t;(function(t){t.EN="en",t.JA="ja"})(_t||(_t={}));var Sr;(function(t){t[t.DOUBLE=0]="DOUBLE",t[t.SINGLE=1]="SINGLE",t[t.TRIPLE=2]="TRIPLE"})(Sr||(Sr={}));var Tr;(function(t){t.SINGLE="single",t.DOUBLE="double",t.TRIPLE="triple"})(Tr||(Tr={}));var ft;(function(t){t.MAINNET="mainnet-beta",t.TESTNET="testnet"})(ft||(ft={}));var Er;(function(t){t.VALIDATOR="validator",t.RPC="rpc"})(Er||(Er={}));var gr;(function(t){t.SOLANA="solana",t.JITO="jito",t.AGAVE="agave",t.FIREDANCER="firedancer"})(gr||(gr={}));var Ar;(function(t){t.CO_HOST_RELAYER="co-host-relayer",t.SEPARATED_RELAYER="separated-relayer",t.WITHOUT_RELAYER="without-relayer"})(Ar||(Ar={}));var wr;(function(t){t.FIREDANCER="firedancer",t.FRANKENDANCER="frankendancer"})(wr||(wr={}));var Oe;(function(t){t[t.TESTNET_VALIDATOR=0]="TESTNET_VALIDATOR",t[t.MAINNET_VALIDATOR=1]="MAINNET_VALIDATOR",t[t.RPC_NODE=2]="RPC_NODE"})(Oe||(Oe={}));var ke;(function(t){t.SOLANA_CLIENT="SolanaClient",t.JITO_MEV="JitoMev",t.FIREDANCER="Firedancer"})(ke||(ke={}));var vr=!1,Rr=!1,Or=!1,kr=!0,j={ID:"solv",LANG:_t.EN,USERNAME:"solv",TESTNET_SOLANA_VERSION:"2.3.6",MAINNET_SOLANA_VERSION:"2.3.6",NODE_VERSION:"20.17.0",TESTNET_DELINQUENT_STAKE:5,MAINNET_DELINQUENT_STAKE:5,COMMISSION:5,SOLANA_NETWORK:"testnet",SOLV_TYPE:0,DISK_TYPES:1,IS_SETUP:!1,LANG_SETUP:!1,DEFAULT_VALIDATOR_VOTE_ACCOUNT_PUBKEY:"ELLB9W7ZCwRCV3FzWcCWoyKP6NjZJKArLyGtkqefnHcG",IS_CLIENT:!1,VALIDATOR_IPS:[],MAINNET_TYPE:"SolanaClient",LEDGER_PATH:"/mnt/ledger",STAKE_ACCOUNT:[],HARVEST_ACCOUNT:"",IS_MEV_MODE:!1,RPC_URL:"https://mainnet-beta.solana.com",KEYPAIR_PATH:"/home/solv/testnet-validator-keypair.json",DISCORD_WEBHOOK_URL:"",AUTO_UPDATE:!1,AUTO_RESTART:!1,ACCOUNTS_PATH:"/mnt/accounts",SNAPSHOTS_PATH:"/mnt/snapshots",MOD:!1},K={ROOT:"/home/solv",AUTHORIZED_KEYS:"/home/solv/.ssh/authorized_keys"},_={ROOT:"/mnt",ACCOUNTS:"/mnt/accounts",LEDGER:"/mnt/ledger",SNAPSHOTS:"/mnt/snapshots"},nt={LOG:"solana-validator.log",STARTUP_SCRIPT:"start-validator.sh",CONFIG:"solv.config.json",JITO_CONFIG:"jito.config.json"},C={SOL_SERVICE:"/etc/systemd/system/solv.service",SOL_LOGROTATE:"/etc/logrotate.d/solana",FRANKENDANCER_LOGROTATE:"/etc/logrotate.d/frankendancer",SOL_SYSTEM_CONFIG21:"/etc/sysctl.d/21-solana-validator.conf",SOL_NOFILES_CONF:"/etc/security/limits.d/90-solana-nofiles.conf",SOL_SYSTEM_CONF:"/etc/systemd/system.conf",SOLANA_PATH:"/home/solv/.local/share/solana/install"},I={MAINNET_VALIDATOR_KEY:"mainnet-validator-keypair.json",MAINNET_VALIDATOR_VOTE_KEY:"mainnet-vote-account-keypair.json",MAINNET_VALITATOR_AUTHORITY_KEY:"mainnet-authority-keypair.json",TESTNET_VALIDATOR_KEY:"testnet-validator-keypair.json",TESTNET_VALIDATOR_VOTE_KEY:"testnet-vote-account-keypair.json",TESTNET_VALITATOR_AUTHORITY_KEY:"testnet-authority-keypair.json"},N=r((t=K.ROOT)=>{let e=t===K.ROOT?K.ROOT:t,o=`${e}/${I.MAINNET_VALIDATOR_KEY}`,n=`${e}/${I.MAINNET_VALIDATOR_VOTE_KEY}`,s=`${e}/${I.MAINNET_VALITATOR_AUTHORITY_KEY}`,a=`${e}/${I.TESTNET_VALIDATOR_KEY}`,i=`${e}/${I.TESTNET_VALIDATOR_VOTE_KEY}`,l=`${e}/${I.TESTNET_VALITATOR_AUTHORITY_KEY}`;return{mainnetValidatorKey:o,mainnetValidatorVoteKey:n,mainnetValidatorAuthorityKey:s,testnetValidatorKey:a,testnetValidatorVoteKey:i,testnetValidatorAuthorityKey:l}},"getAllKeyPaths"),ht=r((t=!0)=>{let e=t?`${K.ROOT}/${I.TESTNET_VALIDATOR_KEY}`:`${K.ROOT}/${I.MAINNET_VALIDATOR_KEY}`,o=t?`${K.ROOT}/${I.TESTNET_VALIDATOR_VOTE_KEY}`:`${K.ROOT}/${I.MAINNET_VALIDATOR_VOTE_KEY}`,n=`${K.ROOT}/${nt.LOG}`,s=_.ACCOUNTS,a=_.LEDGER,i=_.SNAPSHOTS,l=`${K.ROOT}/${nt.STARTUP_SCRIPT}`;return{identity:e,voteAccount:o,log:n,accounts:s,ledger:a,scriptPath:l,snapshots:i}},"startupScriptPaths");var Z="So1vW4Bm6ZURzJJHZy1JpsjoVY68z4cDgF4tTLwYMa5",vo="7tAfLKgRVd9eywSQPuMbVNd51KGkaveZQuTjapL74Fwv",Cr="EiwSTx1Z2uJATDut682U7xzzquFR4UpQJUij3wSxVoSV",Ir=9,st="ELSoL1owwMWQ9foMsutweCsMKbTPVBD9pFqxQGidTaMC",Lr="So11111111111111111111111111111111111111112",Pr="EPjFWdd5AufqSSqeM2qN1xzybapC8G4wEGGkZwyTDt1v",xr="CvB1ztJvpYQPvdPBePtRzjL4aQidjydtUz61NWgcgQtP",_r;(function(t){t[t.ELSOL=st]="ELSOL",t[t.SOL=Lr]="SOL",t[t.USDC=Pr]="USDC",t[t.EPCT=xr]="EPCT"})(_r||(_r={}));var Nr;(function(t){t.V6_BASE_URL="https://quote-api.jup.ag/v6",t.V6_QUOTE_URL="https://quote-api.jup.ag/v6/quote",t.V6_SWAP_URL="https://quote-api.jup.ag/v6/swap"})(Nr||(Nr={}));var Au={[Lr]:9,[st]:9,[Pr]:6,[xr]:6},Ce="/home/solv/currentEpoch.json",Ro=.5,Ie="https://api.testnet.solana.com";import{spawnSync as Oo}from"child_process";var Vr=r(()=>{Oo("pnpm add -g pnpm",{shell:!0,stdio:"inherit"});let t=j.NODE_VERSION;Oo(`pnpm env use ${t} --global`,{shell:!0,stdio:"inherit"}),Oo("pnpm add -g @gabrielhicks/solv",{shell:!0,stdio:"inherit"})},"updateSolv");var ct={version:"2.3.6",tag:"v2.3.6",commissionBps:1e3,relayerUrl:"http://frankfurt.mainnet.relayer.jito.wtf:8100",blockEngineUrl:"https://frankfurt.mainnet.block-engine.jito.wtf",shredReceiverAddr:"64.130.50.14:1002"},Xt={TESTNET:{Dallas:{BLOCK_ENGINE_URL:"https://dallas.testnet.block-engine.jito.wtf",RELAYER_URL:"http://dallas.testnet.relayer.jito.wtf:8100",SHRED_RECEIVER_ADDR:"141.98.218.12:1002"},NewYork:{BLOCK_ENGINE_URL:"https://ny.testnet.block-engine.jito.wtf",RELAYER_URL:"http://ny.testnet.relayer.jito.wtf:8100",SHRED_RECEIVER_ADDR:"64.130.35.224:1002"}},MAINNET:{Amsterdam:{BLOCK_ENGINE_URL:"https://amsterdam.mainnet.block-engine.jito.wtf",RELAYER_URL:"http://amsterdam.mainnet.relayer.jito.wtf:8100",SHRED_RECEIVER_ADDR:"74.118.140.240:1002"},London:{BLOCK_ENGINE_URL:"https://london.mainnet.block-engine.jito.wtf",RELAYER_URL:"http://london.mainnet.relayer.jito.wtf:8100",SHRED_RECEIVER_ADDR:"142.91.127.175:1002"},Frankfurt:{BLOCK_ENGINE_URL:"https://frankfurt.mainnet.block-engine.jito.wtf",RELAYER_URL:"http://frankfurt.mainnet.relayer.jito.wtf:8100",SHRED_RECEIVER_ADDR:"64.130.50.14:1002"},NewYork:{BLOCK_ENGINE_URL:"https://ny.mainnet.block-engine.jito.wtf",RELAYER_URL:"http://ny.mainnet.relayer.jito.wtf:8100",SHRED_RECEIVER_ADDR:"141.98.216.96:1002"},Tokyo:{BLOCK_ENGINE_URL:"https://tokyo.mainnet.block-engine.jito.wtf",RELAYER_URL:"http://tokyo.mainnet.relayer.jito.wtf:8100",SHRED_RECEIVER_ADDR:"202.8.9.160:1002"},SaltLakeCity:{BLOCK_ENGINE_URL:"https://slc.mainnet.block-engine.jito.wtf",RELAYER_URL:"http://slc.mainnet.relayer.jito.wtf:8100",SHRED_RECEIVER_ADDR:"64.130.53.8:1002"},Singapore:{BLOCK_ENGINE_URL:"https://singapore.mainnet.block-engine.jito.wtf",RELAYER_URL:"http://singapore.mainnet.relayer.jito.wtf:8100",SHRED_RECEIVER_ADDR:"202.8.11.224:1002"}}};import{spawnSync as $r}from"child_process";var Le=r((t=ct.tag,e=!1)=>{e?$r(`sh -c "$(curl --netrc-optional -sSfL https://raw.githubusercontent.com/gabrielhicks/jito-solana/${t}-mod/installer)"`,{shell:!0,stdio:"inherit"}):$r(`sh -c "$(curl --netrc-optional -sSfL https://release.jito.wtf/${t}-jito/install)"`,{shell:!0,stdio:"inherit"})},"jitoUpdate");import{readFile as Ki,writeFile as Ui}from"fs/promises";import{homedir as Mi}from"os";var Zt=r(async t=>{let o=`${Mi()}/${nt.JITO_CONFIG}`,s={...JSON.parse(await Ki(o,"utf8")),...t},a=JSON.stringify(s,null,2);await Ui(o,a),console.log(`Updated ${o} with new values.`)},"updateJitoSolvConfig");import{spawnSync as Dr}from"child_process";import Hi from"inquirer";var br=r((t,e=!0)=>{let o=e?"/home/solv/testnet-validator-keypair.json":"/home/solv/mainnet-validator-keypair.json",n=e?"/home/solv/testnet-vote-account-keypair.json":"/home/solv/mainnet-vote-account-keypair.json";Dr(`solana config set --url ${e?"testnet":"mainnet-beta"} --keypair ${o}`,{shell:!0,stdio:"inherit"});let a=`solana vote-update-commission ${n} ${t} ${o} --keypair ${o}`;Dr(a,{shell:!0,stdio:"inherit"})},"updateCommission"),Kr=r(async()=>await Hi.prompt([{type:"number",name:"commission",message:"Enter new commission",default:7}]),"updateCommissionAsk");import{execAsync as te}from"@skeet-framework/utils";import Fi from"chalk";import Yi from"inquirer";var Ur=r(async()=>{let t=await Yi.prompt([{name:"ip",type:"input",message:"Enter your IP address to allow access to RPC NODE:",default:"1.2.3.4"}]);await te("sudo ufw delete allow 8899/udp"),await te("sudo ufw delete allow 8899/tcp"),await te(`sudo ufw allow from ${t.ip} to any port 8899 proto tcp`),await te(`sudo ufw allow from ${t.ip} to any port 8899 proto udp`),await te("sudo ufw reload"),console.log(Fi.white("\u2714\uFE0F Firewall updated!"))},"updateFirewall");var ji=r(()=>or,"getSolvVersion"),Pt=ji;import{readFile as Ji,writeFile as zi}from"fs/promises";import{existsAsync as Wi}from"@skeet-framework/utils";var ko;(function(t){t.EN="en",t.JA="ja"})(ko||(ko={}));var Wu=Object.values(ko),f;(function(t){t.MAINNET="mainnet-beta",t.TESTNET="testnet"})(f||(f={}));var Mr=Object.values(f),A;(function(t){t.RPC="rpc",t.VALIDATOR="validator"})(A||(A={}));var Hr=Object.values(A),T;(function(t){t.SOLANA="solana",t.AGAVE="agave",t.JITO="jito",t.FRANKENDANCER="frankendancer",t.NONE="none"})(T||(T={}));var qu=Object.values(T).filter(t=>t!=="none"),D;(function(t){t.AGAVE="agave",t.JITO="jito",t.NONE="none"})(D||(D={}));var Fr=Object.values(D).filter(t=>t!=="none"),G;(function(t){t.SINGLE="single",t.DOUBLE="double",t.TRIPLE="triple"})(G||(G={}));var B="2.3.6",U="2.3.6",Nt="2.3.6",ee="2.3.6",Yr="2.3.6",vt="2.3.6";var jr="20.17.0",xt="0.702.20300",Vt="0.702.20300";var Bi={NETWORK:f.TESTNET,NODE_TYPE:A.RPC,VALIDATOR_TYPE:T.NONE,RPC_TYPE:D.AGAVE,MNT_DISK_TYPE:G.TRIPLE,TESTNET_SOLANA_VERSION:B,MAINNET_SOLANA_VERSION:U,NODE_VERSION:jr,TESTNET_DELINQUENT_STAKE:5,MAINNET_DELINQUENT_STAKE:5,COMMISSION:5,DEFAULT_VALIDATOR_VOTE_ACCOUNT_PUBKEY:ir,STAKE_ACCOUNTS:[],HARVEST_ACCOUNT:"",IS_MEV_MODE:!1,RPC_URL:cr,KEYPAIR_PATH:"",DISCORD_WEBHOOK_URL:"",AUTO_UPDATE:!1,AUTO_RESTART:!1,IS_DUMMY:!1,API_KEY:"",LEDGER_PATH:w,ACCOUNTS_PATH:It,SNAPSHOTS_PATH:ot,MOD:!1},mt=Bi;import{homedir as qi}from"os";var Qi=r(async()=>{let e=`${qi()}/${Ee}`;return await Wi(e)?JSON.parse(await Ji(e,"utf-8")):(console.log("Creating default config file at",e),await zi(e,JSON.stringify(mt,null,2)),mt)},"readConfig"),V=Qi;import Xi from"node-fetch";var q=r(async t=>{try{let e=await V();if(e.DISCORD_WEBHOOK_URL==="")throw new Error(`DISCORD_WEBHOOK_URL is empty
|
|
3
3
|
Please set DISCORD_WEBHOOK_URL in .env`);let o={content:t,username:"\u{1FA84} Solv Notifier"};return(await Xi(e.DISCORD_WEBHOOK_URL,{method:"POST",body:JSON.stringify(o),headers:{"Content-Type":"application/json"}})).status===204}catch{return console.log({error:`Skeet sendDiscord Error - ${t}`}),!1}},"sendDiscord");import{spawnSync as sl}from"child_process";import{Connection as Gr}from"@solana/web3.js";var oe=r(async(t,e,o=!1,n=200)=>{let s={pubkey:e,isActive:!1,reason:""};try{let a=o?new Gr("https://api.testnet.solana.com"):new Gr(t,"confirmed"),i=await a.getVoteAccounts(),l=i.current.find(u=>u.votePubkey===e);if(!l)return i.delinquent.find(p=>p.votePubkey===e)?(s.isActive=!1,s.reason="Validator is delinquent.",s):(s.isActive=!1,s.reason="Validator is not found in both current and delinquent lists.",s);if(i=await a.getVoteAccounts(),l=i.current.find(u=>u.votePubkey===e),!l)return s.isActive=!1,s.reason="Validator is not found in the current list.",s;let c=l.lastVote,d=await a.getSlot()-c;return d>n?(s.isActive=!1,s.reason=`Validator has not voted for ${d} slots.`,s):(s.isActive=!0,s.reason="Validator is active and voting.",s)}catch(a){return console.error(a),s.isActive=!1,s.reason="Failed to check validator status.",s}},"isValidatorActive");import{spawnSync as Zi}from"child_process";var v=r(t=>{let e=`solana address --keypair ${t}`,{stdout:o}=Zi(e,{shell:!0,stdio:"pipe"});return o.toString().trim()},"getSolanaAddress");var tl=r(t=>new Promise(e=>setTimeout(e,t)),"sleep"),M=tl;import{sendDiscord as el}from"@skeet-framework/utils";var Br=60,ol=r(async t=>{try{let e=t.NETWORK===f.TESTNET,{mainnetValidatorVoteKey:o,testnetValidatorVoteKey:n}=N(),a=v(e?n:o),i=await oe(t.RPC_URL,a,e),l=0;for(;!i.isActive;){if(l>=Br){console.log("Max retries reached, exiting...");let c=`\u26A0\uFE0F Validator is not active for ${Br} minutes!
|
|
4
4
|
Account: ${i.pubkey}
|
|
5
5
|
Reason: ${i.reason}
|
|
6
6
|
Message: Max retries reached, exiting catchup check...
|
|
7
|
-
Please check your validator node \u{1F477}\u200D\u2640\uFE0F`;return await el(c),!1}console.log("Waiting for validator to catch up..."),await M(60*1e3),i=await oe(t.RPC_URL,a,e),l++}return!0}catch(e){return console.log("Error in waitCatchup:",e),!1}},"waitCatchup"),Jr=ol;import{spawnSync as rl}from"node:child_process";var nl=r(()=>{let{stdout:t}=rl("solana --version",{shell:!0});return(t?String(t):"Unknown").trim()},"getSolanaVersion"),Pe=nl;var al=r(async t=>{let e=t.NETWORK===f.MAINNET,o=t.VALIDATOR_TYPE===T.FRANKENDANCER,{mainnetValidatorKey:n,testnetValidatorKey:s}=N(),a=e?n:s,i=Pe(),l=!1;o?l=e?Or:kr:l=e?vr:Rr,l=l&&t.AUTO_RESTART;let c=v(a),m=`**${c}** updated solv to **${Pt()}** with Solana version **${i}**`;if(await W(m),l){let d=`Restarting **${c}**`;await W(d);try{sl("solv update -b",{stdio:"inherit",shell:!0})}catch(y){let g=`Error restarting **${c}**: ${y?.message||"Unknown error"}`;return await W(g),!1}let u=`**${c}** has restarted, catching up...`;await W(u),await M(180*1e3);let p=await Jr(t);if(p){let y=`**${c}** has caught up!`;await W(y)}else{let y=`**${c}** failed to catch up after update`;await W(y)}return p}return!0},"autoUpdate"),zr=al;import{homedir as il}from"os";import{readFile as ll,writeFile as Wr}from"fs/promises";import{existsAsync as cl}from"@skeet-framework/utils";var O=r(async t=>{let o=`${il()}/${Ee}`;await cl(o)||(console.log("Creating default config file at",o),await Wr(o,JSON.stringify(mt,null,2)));let s={...JSON.parse(await ll(o,"utf8")),...t},a=JSON.stringify(s,null,2);await Wr(o,a)},"updateDefaultConfig");var ml={description:"\u{1F48E} Solana Validator All-in-One CLI \u{1F48E}",version:"Output the current version",help:"Display help for solv commands",subcmdHelp:"Display help for subcommands",server:"Open solv Dashboard",start:"Start Solana Validator",stop:"Stop Solana Validator",status:"Show Solana Validator Status",restart:"Restart Solana Validator",update:"Update Solana Validator Version",get:"Get Solana Validator Info Commands",log:"Tail Solana Validator Log",catchup:"Catchup Solana Validator",monitor:"Monitor Solana Validator",config:"Show Solana Validator Config",install:"Install/Update Solana Version",stake:"Solana Delegate Stake",check:"Check Solana Validator",scp:"Download/Upload Solana Validator Keypairs",cron:"Run Schedule Tasks",setup:"Setup Solana Validator",epoch:"Show Current Epoch",slot:"Show Current Slot",solv:"Endroll Solv AA",installer:"Please select an option:",unstake:"UnStake"},xe=ml;var pl={description:"\u{1F48E} \u30BD\u30E9\u30CA\u30D0\u30EA\u30C7\u30FC\u30BF\u30FC\u30AA\u30FC\u30EB\u30A4\u30F3\u30EF\u30F3 CLI \u30C4\u30FC\u30EB \u{1F48E}",version:"\u73FE\u5728\u306E\u30D0\u30FC\u30B8\u30E7\u30F3\u3092\u51FA\u529B",help:"solv \u30B3\u30DE\u30F3\u30C9\u306E\u30AA\u30D7\u30B7\u30E7\u30F3\u8A73\u7D30\u3092\u8868\u793A",subcmdHelp:"\u30B5\u30D6\u30B3\u30DE\u30F3\u30C9\u306E\u30D8\u30EB\u30D7\u3092\u8868\u793A",server:"solv \u30C0\u30C3\u30B7\u30E5\u30DC\u30FC\u30C9\u3092\u958B\u304F",start:"\u30CE\u30FC\u30C9\u3092\u8D77\u52D5",stop:"\u30CE\u30FC\u30C9\u3092\u505C\u6B62",status:"\u30CE\u30FC\u30C9\u306E\u30B9\u30C6\u30FC\u30BF\u30B9\u3092\u8868\u793A",restart:"\u30CE\u30FC\u30C9\u3092\u518D\u8D77\u52D5",update:"\u30CE\u30FC\u30C9\u306E\u30D0\u30FC\u30B8\u30E7\u30F3\u3092\u66F4\u65B0",get:"\u30CE\u30FC\u30C9\u306E\u8A2D\u5B9A\u60C5\u5831\u3092\u53D6\u5F97 \u30B5\u30D6\u30B3\u30DE\u30F3\u30C9",log:"\u30CE\u30FC\u30C9\u306E\u30ED\u30B0\u3092\u8868\u793A",catchup:"\u30CE\u30FC\u30C9\u3092\u30AD\u30E3\u30C3\u30C1\u30A2\u30C3\u30D7",monitor:"\u30CE\u30FC\u30C9\u3092\u76E3\u8996",config:"\u30CE\u30FC\u30C9\u306E\u8A2D\u5B9A\u3092\u8868\u793A",install:"\u30BD\u30E9\u30CA\u306E\u30D0\u30FC\u30B8\u30E7\u30F3\u3092\u66F4\u65B0/\u30A4\u30F3\u30B9\u30C8\u30FC\u30EB",stake:"\u30BD\u30E9\u30CA\u306E\u30B9\u30C6\u30FC\u30AD\u30F3\u30B0\u3092\u884C\u3046",unstake:"\u30BD\u30E9\u30CA\u306E\u30A2\u30F3\u30B9\u30C6\u30FC\u30AD\u30F3\u30B0\u3092\u884C\u3046",check:"\u30CE\u30FC\u30C9\u306E\u72B6\u614B\u3092\u30C1\u30A7\u30C3\u30AF",scp:"scp \u30B5\u30D6\u30B3\u30DE\u30F3\u30C9",cron:"\u30B9\u30B1\u30B8\u30E5\u30FC\u30EB\u30BF\u30B9\u30AF \u30B5\u30D6\u30B3\u30DE\u30F3\u30C9",setup:"\u30BD\u30E9\u30CA\u30D0\u30EA\u30C7\u30FC\u30BF\u30FC\u3092\u30BB\u30C3\u30C8\u30A2\u30C3\u30D7",epoch:"\u73FE\u5728\u306E\u30A8\u30DD\u30C3\u30AF\u3092\u8868\u793A",slot:"\u73FE\u5728\u306E\u30B9\u30ED\u30C3\u30C8\u3092\u8868\u793A",solv:"Solv\u30A8\u30F3\u30C9\u30ED\u30FC\u30EB AA \u3092\u8868\u793A",installer:"\u4EE5\u4E0B\u304B\u3089\u30AA\u30D7\u30B7\u30E7\u30F3\u3092\u9078\u629E\u3057\u3066\u304F\u3060\u3055\u3044:"},qr=pl;var dl={success:{created:"Created"},error:{failed:"Failed"},installer:{welcomeMsg:"\u{1F525} Welcome to the solv installer \u{1F525}",description:"solv is born and ready for running Solana Validator Nodes \u{1F680}"}},Ve=dl;var ul={success:{created:"\u4F5C\u6210\u3055\u308C\u307E\u3057\u305F"},error:{failed:"\u5931\u6557\u3057\u307E\u3057\u305F"},installer:{welcomeMsg:"\u{1F525} \u30BD\u30E9\u30CA\u30D0\u30EA\u30C7\u30FC\u30BF\u30FC\u30C4\u30FC\u30EB solv \u3078\u3088\u3046\u3053\u305D \u{1F525}",description:"\u3042\u306A\u305F\u306F\u3082\u3046\u3001\u30BD\u30E9\u30CA\u30D0\u30EA\u30C7\u30FC\u30BF\u30FC\u306B\u306A\u308B\u6E96\u5099\u304C\u3067\u304D\u3066\u3044\u307E\u3059\u3002"}},Qr=ul;var $e=[") Upgrade - Update/Downgrade Solana Version",") Check Validator Logs/Status or Start/Stop",") Get Validator Config Info",") Backup Validator Keyfiles",") Staking",") Uninstall",") Exit"],De=[[],[") Check Validator Status",") Show Validator Logs",") Start Validator",") Stop Validator",") Restart Validator (no fetch snapshot)",") Restart Validator (fetch snapshot)",") Return to Main Menu"],[") Show Validator Config",") Register Validator Info",") Show Validator Keys Path/Address/Balance",") Get Current Epoch/Slot",") Get Solana Validator Catchup Info",") Get Solana Validator Monitor Info",") Return to Main Menu"],[") Backup Validator Keyfiles",") Set Validator Keyfile/Network",") Return to Main Menu"],[") Stake",") Unstake",") Return to Main Menu"],[],[]];var Xr=[") \u30A2\u30C3\u30D7\u30B0\u30EC\u30FC\u30C9 - Solana\u30D0\u30FC\u30B8\u30E7\u30F3\u306E\u30A2\u30C3\u30D7\u30C7\u30FC\u30C8/\u30C0\u30A6\u30F3\u30B0\u30EC\u30FC\u30C9",") \u30D0\u30EA\u30C7\u30FC\u30BF-\u306E\u72B6\u614B/\u30ED\u30B0\u3092\u78BA\u8A8D\u30FB\u307E\u305F\u306F\u958B\u59CB/\u505C\u6B62",") \u30D0\u30EA\u30C7\u30FC\u30BF-\u306E\u8A2D\u5B9A\u60C5\u5831",") \u9375\u306E\u8A2D\u5B9A",") \u30B9\u30C6\u30FC\u30AD\u30F3\u30B0",") \u30A2\u30F3\u30A4\u30F3\u30B9\u30C8\u30FC\u30EB",") \u7D42\u4E86"],Zr=[[],[") \u30D0\u30EA\u30C7\u30FC\u30BF-\u306E\u72B6\u614B\u3092\u78BA\u8A8D",") \u30D0\u30EA\u30C7\u30FC\u30BF\u30FC\u306E\u30ED\u30B0\u3092\u8868\u793A",") \u30D0\u30EA\u30C7\u30FC\u30BF-\u3092\u958B\u59CB",") \u30D0\u30EA\u30C7\u30FC\u30BF-\u3092\u505C\u6B62",") \u30D0\u30EA\u30C7\u30FC\u30BF-\u3092\u518D\u8D77\u52D5 (fetch snapshot \u306A\u3057)",") \u30D0\u30EA\u30C7\u30FC\u30BF-\u3092\u518D\u8D77\u52D5 (fetch snapshot \u3042\u308A)",") \u30E1\u30A4\u30F3\u30E1\u30CB\u30E5\u30FC\u306B\u623B\u308B"],[") \u30D0\u30EA\u30C7\u30FC\u30BF-\u306E\u8A2D\u5B9A\u3092\u898B\u308B",") \u30D0\u30EA\u30C7\u30FC\u30BF-\u60C5\u5831\u3092\u767B\u9332\u3059\u308B",") \u30D0\u30EA\u30C7\u30FC\u30BF-\u306E\u9375\u306E \u30D1\u30B9/\u30A2\u30C9\u30EC\u30B9/\u6B8B\u9AD8 \u3092\u898B\u308B",") \u73FE\u5728\u306E \u30A8\u30DD\u30C3\u30AF/\u30B9\u30ED\u30C3\u30C8 \u3092\u898B\u308B",") \u30D0\u30EA\u30C7\u30FC\u30BF\u30FC\u306E Catchup \u60C5\u5831\u3092\u898B\u308B",") \u30D0\u30EA\u30C7\u30FC\u30BF\u30FC\u306E\u30E2\u30CB\u30BF\u30FC\u60C5\u5831\u3092\u898B\u308B",") \u30E1\u30A4\u30F3\u30E1\u30CB\u30E5\u30FC\u306B\u623B\u308B"],[") \u30D0\u30EA\u30C7\u30FC\u30BF\u30FC\u306E\u9375\u3092\u30D0\u30C3\u30AF\u30A2\u30C3\u30D7",") \u9375/\u30CD\u30C3\u30C8\u30EF\u30FC\u30AF\u3092\u8A2D\u5B9A\u3059\u308B",") \u30E1\u30A4\u30F3\u30E1\u30CB\u30E5\u30FC\u306B\u623B\u308B"],[") \u30B9\u30C6\u30FC\u30AD\u30F3\u30B0\u3092\u884C\u3046",") \u30A2\u30F3\u30B9\u30C6\u30FC\u30AD\u30F3\u30B0\u3092\u884C\u3046",") \u30E1\u30A4\u30F3\u30E1\u30CB\u30E5\u30FC\u306B\u623B\u308B"],[],[]];var fl={server:{description:"Open solv Dashboard"},start:{description:"Start Solana Validator"},stop:{description:"Stop Solana Validator"},status:{description:"Show Solana Validator Status"},restart:{description:"Restart Solana Validator"},update:{description:"Update Solana Validator Version"},get:{description:"Get Solana Validator Info"},log:{description:"Tail Solana Validator Log"},catchup:{description:"Catchup Solana Validator"},monitor:{description:"Monitor Solana Validator"},config:{description:"Show Solana Validator Config"},install:{description:"Install/Update Solana Version"},stake:{description:"Solana Delegate Stake"},unstake:{description:"UnStake"},check:{description:"Check Solana Validator"},scp:{description:"Download/Upload Solana Validator Keypairs"},cron:{description:"Run Schedule Tasks"},setup:{description:"Setup Solana Validator"},epoch:{description:"Show Current Epoch"},slot:{description:"Show Current Slot"},solv:{description:"Endroll Solv AA"}},be=fl;var hl={server:{description:"Open solv Dashboard"},start:{description:"Start Solana Validator"},stop:{description:"Stop Solana Validator"},status:{description:"Show Solana Validator Status"},restart:{description:"Restart Solana Validator"},update:{description:"Update Solana Validator Version"},get:{description:"Get Solana Validator Info"},log:{description:"Tail Solana Validator Log"},catchup:{description:"Catchup Solana Validator"},monitor:{description:"Monitor Solana Validator"},config:{description:"Show Solana Validator Config"},install:{description:"Install/Update Solana Version"},stake:{description:"Solana Delegate Stake"},unstake:{description:"UnStake"},check:{description:"Check Solana Validator"},scp:{description:"Download/Upload Solana Validator Keypairs"},cron:{description:"Run Schedule Tasks"},setup:{description:"Setup Solana Validator"},epoch:{description:"Show Current Epoch"},slot:{description:"Show Current Slot"},solv:{description:"Endroll Solv AA"}},tn=hl;var Ke=[") Check Validator Status",") Download Validator Keyfiles",") Generate Validator Keyfiles",") Upload Validator Keyfiles",") Set Validator Keyfile/Network",") Uninstall",") Exit"];var en=[") \u30D0\u30EA\u30C7\u30FC\u30BF-\u306E\u72B6\u614B\u3092\u78BA\u8A8D",") \u30D0\u30EA\u30C7\u30FC\u30BF\u30FC\u306E\u9375\u3092\u30C0\u30A6\u30F3\u30ED\u30FC\u30C9",") \u30D0\u30EA\u30C7\u30FC\u30BF\u30FC\u306E\u9375\u3092\u4F5C\u6210",") \u30D0\u30EA\u30C7\u30FC\u30BF\u30FC\u306E\u9375\u3092\u30A2\u30C3\u30D7\u30ED\u30FC\u30C9",") \u9375/\u30CD\u30C3\u30C8\u30EF\u30FC\u30AF\u3092\u8A2D\u5B9A\u3059\u308B",") \u30A2\u30F3\u30A4\u30F3\u30B9\u30C8\u30FC\u30EB",") \u7D42\u4E86"];var yl=r(t=>{let e={cmds:xe,subCmds:be,logs:Ve,installer:$e,installerSub:De,clientCmds:Ke};switch(t){case _t.EN:e={cmds:xe,subCmds:be,logs:Ve,installer:$e,installerSub:De,clientCmds:Ke};break;case _t.JA:e={cmds:qr,subCmds:tn,logs:Qr,installer:Xr,installerSub:Zr,clientCmds:en};break;default:e={cmds:xe,subCmds:be,logs:Ve,installer:$e,installerSub:De,clientCmds:Ke}}return e},"readLocale"),on=yl;import{existsSync as gl,readFileSync as Al,writeFileSync as rn}from"fs";import{readFileSync as Sl,writeFileSync as Tl}from"fs";import{homedir as El}from"os";var $t=r(t=>{let o=`${El()}/${nt.CONFIG}`,s={...JSON.parse(Sl(o,"utf8")),...t},a=JSON.stringify(s,null,2);Tl(o,a)},"updateSolvConfig");import{homedir as wl}from"os";var nn=r(()=>{let e=`${wl()}/${nt.CONFIG}`;gl(e)||(rn(e,JSON.stringify(j,null,2)),console.log(`Created default config file at ${e}`));let o;try{o=JSON.parse(Al(e,"utf-8"))}catch{console.log("Error parsing config file. Renewing config file."),rn(e,JSON.stringify(j,null,2)),o=j}let n=on(o.LANG);return o.RPC_URL||(o.RPC_URL=j.RPC_URL,$t({RPC_URL:j.RPC_URL})),o.IS_MEV_MODE===void 0&&(o.IS_MEV_MODE=!1,$t({IS_MEV_MODE:!1})),o.DISCORD_WEBHOOK_URL||(o.DISCORD_WEBHOOK_URL="",$t({DISCORD_WEBHOOK_URL:""})),{config:o,locale:n}},"readOrCreateDefaultConfig");import{spawnSync as sn}from"node:child_process";var Dt=r((t=!1,e="45",o=ot,n=U,s=t?"https://api.testnet.solana.com":"https://api.mainnet-beta.solana.com",a=!1)=>{try{let i=`docker run -it --rm -v ${o}:${o} --user $(id -u):$(id -g) c29r3/solana-snapshot-finder:latest --snapshot_path ${o} --min_download_speed ${e} --version ${n} --rpc ${s}`;if(t&&a){sn(`wget --trust-server-names https://snapshots.avorio.network/testnet/snapshot.tar.bz2 https://snapshots.avorio.network/testnet/incremental-snapshot.tar.bz2 && for file in snapshot-* incremental-snapshot-*; do mv "$file" "$(echo "$file" | sed 's/\\?.*$//')"; done`,{shell:!0,stdio:"inherit",cwd:o});return}sn(i,{shell:!0,stdio:"inherit"})}catch(i){throw new Error(`getSnapshot Error: ${i}`)}},"getSnapshot");import{spawnSync as q}from"child_process";var an=r(async(t,e,o=!1)=>{let n=t.NETWORK===f.TESTNET,s=e||(n?xt:Vt);o||t.MOD?(q("git -C /home/solv/firedancer fetch origin",{shell:!0,stdio:"inherit"}),q(`git -C /home/solv/firedancer checkout v${s}-mod`,{shell:!0,stdio:"inherit"}),q("git -C /home/solv/firedancer submodule update --init --recursive",{shell:!0,stdio:"inherit"})):(q("git -C /home/solv/firedancer fetch origin",{shell:!0,stdio:"inherit"}),q(`git -C /home/solv/firedancer checkout v${s}`,{shell:!0,stdio:"inherit"}),q("git -C /home/solv/firedancer submodule update --init --recursive",{shell:!0,stdio:"inherit"})),q("rustup uninstall 1.84.1-x86_64-unknown-linux-gnu",{shell:!0,stdio:"inherit",cwd:"/home/solv/firedancer"}),q("rustup install 1.84.1",{shell:!0,stdio:"inherit",cwd:"/home/solv/firedancer"}),q("export FD_AUTO_INSTALL_PACKAGES=1 && ./deps.sh fetch check install",{shell:!0,stdio:"inherit",cwd:"/home/solv/firedancer"}),q("make -j fdctl solana",{shell:!0,stdio:"inherit",cwd:"/home/solv/firedancer"}),q("sudo systemctl restart frankendancer",{shell:!0,stdio:"inherit"}),q("sudo systemctl restart port-relay",{shell:!0,stdio:"inherit"})},"frankendancerUpdate");var cn=r(t=>{let e=t.NETWORK===f.TESTNET,o=t.NODE_TYPE===A.RPC,n=t.VALIDATOR_TYPE===T.JITO,s=t.VALIDATOR_TYPE===T.FRANKENDANCER,a=t.AUTO_RESTART,i=t.MOD,l=10;a&&!e&&(l=30);let c=e?B:U;n&&(c=ee,e&&(c=Nt)),s&&(c=Vt,e&&(c=xt)),o&&(c=vt,n&&(c=Yr)),h.command("update").alias("u").description("Update Command").option("-v, --version <version>",`Solana Version e.g ${c}`,c).option("-b, --background","No Monitor Delinquent Stake Update",!1).option("-c, --commission","Update Commission",!1).option("-f, --firewall","Update Firewall",!1).option("--migrate-config","Migrate Solv Config",!1).option("--config","Update Solv Config Default Solana Version",!1).option("--auto","Auto Update",!1).option("--mod","Modified Versions",!1).action(async m=>{let d=Pt(),u=e?t.TESTNET_DELINQUENT_STAKE:t.MAINNET_DELINQUENT_STAKE;if(console.log(ln.white(`Current solv version: ${d}`)),m.auto){await zr(t);return}if(m.migrateConfig){let p=nn().config,y=G.TRIPLE;p.DISK_TYPES===0?y=G.DOUBLE:p.DISK_TYPES===1?y=G.SINGLE:y=G.TRIPLE;let g=p.SOLANA_NETWORK===ft.TESTNET,S=p.SOLV_TYPE===Oe.RPC_NODE,E=p.MAINNET_TYPE===ke.JITO_MEV,$={NETWORK:g?f.TESTNET:f.MAINNET,NODE_TYPE:S?A.RPC:A.VALIDATOR,MNT_DISK_TYPE:y,RPC_TYPE:S?D.JITO:D.NONE,VALIDATOR_TYPE:E?T.JITO:g?T.AGAVE:T.SOLANA,TESTNET_SOLANA_VERSION:p.TESTNET_SOLANA_VERSION,MAINNET_SOLANA_VERSION:p.MAINNET_SOLANA_VERSION,NODE_VERSION:p.NODE_VERSION,TESTNET_DELINQUENT_STAKE:p.TESTNET_DELINQUENT_STAKE,MAINNET_DELINQUENT_STAKE:p.MAINNET_DELINQUENT_STAKE,COMMISSION:p.COMMISSION,DEFAULT_VALIDATOR_VOTE_ACCOUNT_PUBKEY:p.DEFAULT_VALIDATOR_VOTE_ACCOUNT_PUBKEY,STAKE_ACCOUNTS:p.STAKE_ACCOUNT,HARVEST_ACCOUNT:p.HARVEST_ACCOUNT,IS_MEV_MODE:p.IS_MEV_MODE,RPC_URL:p.RPC_URL,KEYPAIR_PATH:p.KEYPAIR_PATH,DISCORD_WEBHOOK_URL:p.DISCORD_WEBHOOK_URL,AUTO_UPDATE:p.AUTO_UPDATE,AUTO_RESTART:p.AUTO_RESTART,IS_DUMMY:!1,API_KEY:"",LEDGER_PATH:p.LEDGER_PATH,ACCOUNTS_PATH:"/mnt/accounts",SNAPSHOTS_PATH:"/mnt/snapshots",MOD:!1};await O($)}if(m.config){if(await O({TESTNET_SOLANA_VERSION:B,MAINNET_SOLANA_VERSION:U}),n){let p=e?Nt:ee;await Zt({version:p,tag:`v${p}`})}console.log(ln.green("\u2714\uFE0F Updated Solv Config Default Solana Version\n\n You can now run `solv i` to install the latest version"));return}if(m.firewall){await Ur();return}if(m.background){let p=m.version;if(await O({TESTNET_SOLANA_VERSION:B,MAINNET_SOLANA_VERSION:U}),n){Le(`v${p}`,m.mod||i),await Zt({version:p,tag:`v${p}`}),await Re(u,!0,l);return}if(e&&Dt(e,"10",t.SNAPSHOTS_PATH,B),s){await an(t,p,m.mod||i),await Re(u,!0,l);return}await ve(p,m.mod||i),await Re(e?5:5,!0,l);return}else if(m.commission){let p=await Kr();br(p.commission,e)}else Vr()})},"updateCommands");import{spawnSync as _l}from"node:child_process";var mn=r(t=>{try{let{log:e}=ht(),o=`tail -f ${e}`;t.error?o+=" | grep '\\(WARN\\|ERR\\)'":t.info?o+=" | grep INFO":t.warning&&(o+=" | grep WARN"),console.log(o);let n=_l(o,{shell:!0,stdio:"inherit"});if(n.error)throw n.error;n.signal==="SIGINT"?(console.log("Child process terminated due to receipt of SIGINT signal"),process.exit(0)):n.status!==0&&(console.error(`Child process exited with code ${n.status}`),process.exit(n.status))}catch(e){console.error(`tail Error: ${e}`),process.exit(1)}},"tail");var pn=r(()=>{h.command("log").description("tail logs").alias("l").description("tail logs").option("-i, --info","Follow INFO output",!1).option("-w, --warning","Follow WARN output",!1).option("-e, --error","Follow ERR/WARN output",!1).option("-a, --all","Follow All output",!1).action(t=>{mn(t)})},"logCommands");import dt from"chalk";import{spawnSync as Nl}from"child_process";import{homedir as vl}from"os";var Ue=r(t=>{let e=vl(),o=N(e),n=o.testnetValidatorVoteKey,s=o.testnetValidatorKey,a=o.testnetValidatorAuthorityKey,i=ft.TESTNET,l=t.COMMISSION;t.NETWORK===f.MAINNET&&(n=o.mainnetValidatorVoteKey,s=o.mainnetValidatorKey,a=o.mainnetValidatorAuthorityKey,i=ft.MAINNET),console.log(`\u231B\uFE0F Creating vote account with commission ${l} - ${i}`);let c=t.RPC_URL||i;t.NETWORK===f.TESTNET&&(c=ft.TESTNET);let m=`solana create-vote-account ${n} ${s} ${a} --commission ${l} --url ${c} --keypair ${s}`;Nl(m,{shell:!0,stdio:"inherit"})},"setupVoteAccount");import{spawnSync as Me}from"child_process";import{existsSync as dn,readdirSync as Rl,rmSync as Ol}from"fs";import{homedir as kl}from"os";import un from"path";var He=r(t=>{let e=[],o=0;t.NODE_TYPE===A.RPC&&(e=[I.MAINNET_VALIDATOR_KEY],o=1),t.NETWORK===f.TESTNET?(e=[I.TESTNET_VALIDATOR_KEY,I.TESTNET_VALITATOR_AUTHORITY_KEY,I.TESTNET_VALIDATOR_VOTE_KEY,I.MAINNET_VALIDATOR_KEY,I.MAINNET_VALITATOR_AUTHORITY_KEY,I.MAINNET_VALIDATOR_VOTE_KEY],o=6):(e=[I.MAINNET_VALIDATOR_KEY,I.MAINNET_VALITATOR_AUTHORITY_KEY,I.MAINNET_VALIDATOR_VOTE_KEY],o=3);let n=`solana-keygen grind --starts-and-ends-with E:SV:${o}`;Me(n,{shell:!0,stdio:"ignore"});let s=Rl("./").filter(c=>c.endsWith("SV.json")),a=kl(),i=un.join(a,"unstaked-identity.json");dn(i)&&Me(`mv ${i} ${a}/unstaked-identity.backup.json`,{shell:!0,stdio:"ignore"});let l=0;for(let c of s){let m=un.join(a,e[l]);if(l++,dn(m)){console.log(`${m} is already exist!`),Ol(c,{recursive:!0});continue}let d=`mv ${c} ${m}`;Me(d,{shell:!0,stdio:"inherit"})}Me("solana-keygen new -s --no-bip39-passphrase -o /home/solv/unstaked-identity.json",{shell:!0,stdio:"ignore"}),console.log(`Generated keypairs - ${a}`)},"createSolvKeyPairs");import{spawnSync as hn}from"child_process";var Cl=r((t,e,o,n=2001)=>{let s="/etc/systemd/system/jupiter-api.service",a=`[Unit]
|
|
7
|
+
Please check your validator node \u{1F477}\u200D\u2640\uFE0F`;return await el(c),!1}console.log("Waiting for validator to catch up..."),await M(60*1e3),i=await oe(t.RPC_URL,a,e),l++}return!0}catch(e){return console.log("Error in waitCatchup:",e),!1}},"waitCatchup"),Jr=ol;import{spawnSync as rl}from"node:child_process";var nl=r(()=>{let{stdout:t}=rl("solana --version",{shell:!0});return(t?String(t):"Unknown").trim()},"getSolanaVersion"),Pe=nl;var al=r(async t=>{let e=t.NETWORK===f.MAINNET,o=t.VALIDATOR_TYPE===T.FRANKENDANCER,{mainnetValidatorKey:n,testnetValidatorKey:s}=N(),a=e?n:s,i=Pe(),l=!1;o?l=e?Or:kr:l=e?vr:Rr,l=l&&t.AUTO_RESTART;let c=v(a),m=`**${c}** updated solv to **${Pt()}** with Solana version **${i}**`;if(await q(m),l){let d=`Restarting **${c}**`;await q(d);try{sl("solv update -b",{stdio:"inherit",shell:!0})}catch(y){let g=`Error restarting **${c}**: ${y?.message||"Unknown error"}`;return await q(g),!1}let u=`**${c}** has restarted, catching up...`;await q(u),await M(180*1e3);let p=await Jr(t);if(p){let y=`**${c}** has caught up!`;await q(y)}else{let y=`**${c}** failed to catch up after update`;await q(y)}return p}return!0},"autoUpdate"),zr=al;import{homedir as il}from"os";import{readFile as ll,writeFile as Wr}from"fs/promises";import{existsAsync as cl}from"@skeet-framework/utils";var O=r(async t=>{let o=`${il()}/${Ee}`;await cl(o)||(console.log("Creating default config file at",o),await Wr(o,JSON.stringify(mt,null,2)));let s={...JSON.parse(await ll(o,"utf8")),...t},a=JSON.stringify(s,null,2);await Wr(o,a)},"updateDefaultConfig");var ml={description:"\u{1F48E} Solana Validator All-in-One CLI \u{1F48E}",version:"Output the current version",help:"Display help for solv commands",subcmdHelp:"Display help for subcommands",server:"Open solv Dashboard",start:"Start Solana Validator",stop:"Stop Solana Validator",status:"Show Solana Validator Status",restart:"Restart Solana Validator",update:"Update Solana Validator Version",get:"Get Solana Validator Info Commands",log:"Tail Solana Validator Log",catchup:"Catchup Solana Validator",monitor:"Monitor Solana Validator",config:"Show Solana Validator Config",install:"Install/Update Solana Version",stake:"Solana Delegate Stake",check:"Check Solana Validator",scp:"Download/Upload Solana Validator Keypairs",cron:"Run Schedule Tasks",setup:"Setup Solana Validator",epoch:"Show Current Epoch",slot:"Show Current Slot",solv:"Endroll Solv AA",installer:"Please select an option:",unstake:"UnStake"},xe=ml;var pl={description:"\u{1F48E} \u30BD\u30E9\u30CA\u30D0\u30EA\u30C7\u30FC\u30BF\u30FC\u30AA\u30FC\u30EB\u30A4\u30F3\u30EF\u30F3 CLI \u30C4\u30FC\u30EB \u{1F48E}",version:"\u73FE\u5728\u306E\u30D0\u30FC\u30B8\u30E7\u30F3\u3092\u51FA\u529B",help:"solv \u30B3\u30DE\u30F3\u30C9\u306E\u30AA\u30D7\u30B7\u30E7\u30F3\u8A73\u7D30\u3092\u8868\u793A",subcmdHelp:"\u30B5\u30D6\u30B3\u30DE\u30F3\u30C9\u306E\u30D8\u30EB\u30D7\u3092\u8868\u793A",server:"solv \u30C0\u30C3\u30B7\u30E5\u30DC\u30FC\u30C9\u3092\u958B\u304F",start:"\u30CE\u30FC\u30C9\u3092\u8D77\u52D5",stop:"\u30CE\u30FC\u30C9\u3092\u505C\u6B62",status:"\u30CE\u30FC\u30C9\u306E\u30B9\u30C6\u30FC\u30BF\u30B9\u3092\u8868\u793A",restart:"\u30CE\u30FC\u30C9\u3092\u518D\u8D77\u52D5",update:"\u30CE\u30FC\u30C9\u306E\u30D0\u30FC\u30B8\u30E7\u30F3\u3092\u66F4\u65B0",get:"\u30CE\u30FC\u30C9\u306E\u8A2D\u5B9A\u60C5\u5831\u3092\u53D6\u5F97 \u30B5\u30D6\u30B3\u30DE\u30F3\u30C9",log:"\u30CE\u30FC\u30C9\u306E\u30ED\u30B0\u3092\u8868\u793A",catchup:"\u30CE\u30FC\u30C9\u3092\u30AD\u30E3\u30C3\u30C1\u30A2\u30C3\u30D7",monitor:"\u30CE\u30FC\u30C9\u3092\u76E3\u8996",config:"\u30CE\u30FC\u30C9\u306E\u8A2D\u5B9A\u3092\u8868\u793A",install:"\u30BD\u30E9\u30CA\u306E\u30D0\u30FC\u30B8\u30E7\u30F3\u3092\u66F4\u65B0/\u30A4\u30F3\u30B9\u30C8\u30FC\u30EB",stake:"\u30BD\u30E9\u30CA\u306E\u30B9\u30C6\u30FC\u30AD\u30F3\u30B0\u3092\u884C\u3046",unstake:"\u30BD\u30E9\u30CA\u306E\u30A2\u30F3\u30B9\u30C6\u30FC\u30AD\u30F3\u30B0\u3092\u884C\u3046",check:"\u30CE\u30FC\u30C9\u306E\u72B6\u614B\u3092\u30C1\u30A7\u30C3\u30AF",scp:"scp \u30B5\u30D6\u30B3\u30DE\u30F3\u30C9",cron:"\u30B9\u30B1\u30B8\u30E5\u30FC\u30EB\u30BF\u30B9\u30AF \u30B5\u30D6\u30B3\u30DE\u30F3\u30C9",setup:"\u30BD\u30E9\u30CA\u30D0\u30EA\u30C7\u30FC\u30BF\u30FC\u3092\u30BB\u30C3\u30C8\u30A2\u30C3\u30D7",epoch:"\u73FE\u5728\u306E\u30A8\u30DD\u30C3\u30AF\u3092\u8868\u793A",slot:"\u73FE\u5728\u306E\u30B9\u30ED\u30C3\u30C8\u3092\u8868\u793A",solv:"Solv\u30A8\u30F3\u30C9\u30ED\u30FC\u30EB AA \u3092\u8868\u793A",installer:"\u4EE5\u4E0B\u304B\u3089\u30AA\u30D7\u30B7\u30E7\u30F3\u3092\u9078\u629E\u3057\u3066\u304F\u3060\u3055\u3044:"},qr=pl;var dl={success:{created:"Created"},error:{failed:"Failed"},installer:{welcomeMsg:"\u{1F525} Welcome to the solv installer \u{1F525}",description:"solv is born and ready for running Solana Validator Nodes \u{1F680}"}},Ve=dl;var ul={success:{created:"\u4F5C\u6210\u3055\u308C\u307E\u3057\u305F"},error:{failed:"\u5931\u6557\u3057\u307E\u3057\u305F"},installer:{welcomeMsg:"\u{1F525} \u30BD\u30E9\u30CA\u30D0\u30EA\u30C7\u30FC\u30BF\u30FC\u30C4\u30FC\u30EB solv \u3078\u3088\u3046\u3053\u305D \u{1F525}",description:"\u3042\u306A\u305F\u306F\u3082\u3046\u3001\u30BD\u30E9\u30CA\u30D0\u30EA\u30C7\u30FC\u30BF\u30FC\u306B\u306A\u308B\u6E96\u5099\u304C\u3067\u304D\u3066\u3044\u307E\u3059\u3002"}},Qr=ul;var $e=[") Upgrade - Update/Downgrade Solana Version",") Check Validator Logs/Status or Start/Stop",") Get Validator Config Info",") Backup Validator Keyfiles",") Staking",") Uninstall",") Exit"],De=[[],[") Check Validator Status",") Show Validator Logs",") Start Validator",") Stop Validator",") Restart Validator (no fetch snapshot)",") Restart Validator (fetch snapshot)",") Return to Main Menu"],[") Show Validator Config",") Register Validator Info",") Show Validator Keys Path/Address/Balance",") Get Current Epoch/Slot",") Get Solana Validator Catchup Info",") Get Solana Validator Monitor Info",") Return to Main Menu"],[") Backup Validator Keyfiles",") Set Validator Keyfile/Network",") Return to Main Menu"],[") Stake",") Unstake",") Return to Main Menu"],[],[]];var Xr=[") \u30A2\u30C3\u30D7\u30B0\u30EC\u30FC\u30C9 - Solana\u30D0\u30FC\u30B8\u30E7\u30F3\u306E\u30A2\u30C3\u30D7\u30C7\u30FC\u30C8/\u30C0\u30A6\u30F3\u30B0\u30EC\u30FC\u30C9",") \u30D0\u30EA\u30C7\u30FC\u30BF-\u306E\u72B6\u614B/\u30ED\u30B0\u3092\u78BA\u8A8D\u30FB\u307E\u305F\u306F\u958B\u59CB/\u505C\u6B62",") \u30D0\u30EA\u30C7\u30FC\u30BF-\u306E\u8A2D\u5B9A\u60C5\u5831",") \u9375\u306E\u8A2D\u5B9A",") \u30B9\u30C6\u30FC\u30AD\u30F3\u30B0",") \u30A2\u30F3\u30A4\u30F3\u30B9\u30C8\u30FC\u30EB",") \u7D42\u4E86"],Zr=[[],[") \u30D0\u30EA\u30C7\u30FC\u30BF-\u306E\u72B6\u614B\u3092\u78BA\u8A8D",") \u30D0\u30EA\u30C7\u30FC\u30BF\u30FC\u306E\u30ED\u30B0\u3092\u8868\u793A",") \u30D0\u30EA\u30C7\u30FC\u30BF-\u3092\u958B\u59CB",") \u30D0\u30EA\u30C7\u30FC\u30BF-\u3092\u505C\u6B62",") \u30D0\u30EA\u30C7\u30FC\u30BF-\u3092\u518D\u8D77\u52D5 (fetch snapshot \u306A\u3057)",") \u30D0\u30EA\u30C7\u30FC\u30BF-\u3092\u518D\u8D77\u52D5 (fetch snapshot \u3042\u308A)",") \u30E1\u30A4\u30F3\u30E1\u30CB\u30E5\u30FC\u306B\u623B\u308B"],[") \u30D0\u30EA\u30C7\u30FC\u30BF-\u306E\u8A2D\u5B9A\u3092\u898B\u308B",") \u30D0\u30EA\u30C7\u30FC\u30BF-\u60C5\u5831\u3092\u767B\u9332\u3059\u308B",") \u30D0\u30EA\u30C7\u30FC\u30BF-\u306E\u9375\u306E \u30D1\u30B9/\u30A2\u30C9\u30EC\u30B9/\u6B8B\u9AD8 \u3092\u898B\u308B",") \u73FE\u5728\u306E \u30A8\u30DD\u30C3\u30AF/\u30B9\u30ED\u30C3\u30C8 \u3092\u898B\u308B",") \u30D0\u30EA\u30C7\u30FC\u30BF\u30FC\u306E Catchup \u60C5\u5831\u3092\u898B\u308B",") \u30D0\u30EA\u30C7\u30FC\u30BF\u30FC\u306E\u30E2\u30CB\u30BF\u30FC\u60C5\u5831\u3092\u898B\u308B",") \u30E1\u30A4\u30F3\u30E1\u30CB\u30E5\u30FC\u306B\u623B\u308B"],[") \u30D0\u30EA\u30C7\u30FC\u30BF\u30FC\u306E\u9375\u3092\u30D0\u30C3\u30AF\u30A2\u30C3\u30D7",") \u9375/\u30CD\u30C3\u30C8\u30EF\u30FC\u30AF\u3092\u8A2D\u5B9A\u3059\u308B",") \u30E1\u30A4\u30F3\u30E1\u30CB\u30E5\u30FC\u306B\u623B\u308B"],[") \u30B9\u30C6\u30FC\u30AD\u30F3\u30B0\u3092\u884C\u3046",") \u30A2\u30F3\u30B9\u30C6\u30FC\u30AD\u30F3\u30B0\u3092\u884C\u3046",") \u30E1\u30A4\u30F3\u30E1\u30CB\u30E5\u30FC\u306B\u623B\u308B"],[],[]];var fl={server:{description:"Open solv Dashboard"},start:{description:"Start Solana Validator"},stop:{description:"Stop Solana Validator"},status:{description:"Show Solana Validator Status"},restart:{description:"Restart Solana Validator"},update:{description:"Update Solana Validator Version"},get:{description:"Get Solana Validator Info"},log:{description:"Tail Solana Validator Log"},catchup:{description:"Catchup Solana Validator"},monitor:{description:"Monitor Solana Validator"},config:{description:"Show Solana Validator Config"},install:{description:"Install/Update Solana Version"},stake:{description:"Solana Delegate Stake"},unstake:{description:"UnStake"},check:{description:"Check Solana Validator"},scp:{description:"Download/Upload Solana Validator Keypairs"},cron:{description:"Run Schedule Tasks"},setup:{description:"Setup Solana Validator"},epoch:{description:"Show Current Epoch"},slot:{description:"Show Current Slot"},solv:{description:"Endroll Solv AA"}},be=fl;var hl={server:{description:"Open solv Dashboard"},start:{description:"Start Solana Validator"},stop:{description:"Stop Solana Validator"},status:{description:"Show Solana Validator Status"},restart:{description:"Restart Solana Validator"},update:{description:"Update Solana Validator Version"},get:{description:"Get Solana Validator Info"},log:{description:"Tail Solana Validator Log"},catchup:{description:"Catchup Solana Validator"},monitor:{description:"Monitor Solana Validator"},config:{description:"Show Solana Validator Config"},install:{description:"Install/Update Solana Version"},stake:{description:"Solana Delegate Stake"},unstake:{description:"UnStake"},check:{description:"Check Solana Validator"},scp:{description:"Download/Upload Solana Validator Keypairs"},cron:{description:"Run Schedule Tasks"},setup:{description:"Setup Solana Validator"},epoch:{description:"Show Current Epoch"},slot:{description:"Show Current Slot"},solv:{description:"Endroll Solv AA"}},tn=hl;var Ke=[") Check Validator Status",") Download Validator Keyfiles",") Generate Validator Keyfiles",") Upload Validator Keyfiles",") Set Validator Keyfile/Network",") Uninstall",") Exit"];var en=[") \u30D0\u30EA\u30C7\u30FC\u30BF-\u306E\u72B6\u614B\u3092\u78BA\u8A8D",") \u30D0\u30EA\u30C7\u30FC\u30BF\u30FC\u306E\u9375\u3092\u30C0\u30A6\u30F3\u30ED\u30FC\u30C9",") \u30D0\u30EA\u30C7\u30FC\u30BF\u30FC\u306E\u9375\u3092\u4F5C\u6210",") \u30D0\u30EA\u30C7\u30FC\u30BF\u30FC\u306E\u9375\u3092\u30A2\u30C3\u30D7\u30ED\u30FC\u30C9",") \u9375/\u30CD\u30C3\u30C8\u30EF\u30FC\u30AF\u3092\u8A2D\u5B9A\u3059\u308B",") \u30A2\u30F3\u30A4\u30F3\u30B9\u30C8\u30FC\u30EB",") \u7D42\u4E86"];var yl=r(t=>{let e={cmds:xe,subCmds:be,logs:Ve,installer:$e,installerSub:De,clientCmds:Ke};switch(t){case _t.EN:e={cmds:xe,subCmds:be,logs:Ve,installer:$e,installerSub:De,clientCmds:Ke};break;case _t.JA:e={cmds:qr,subCmds:tn,logs:Qr,installer:Xr,installerSub:Zr,clientCmds:en};break;default:e={cmds:xe,subCmds:be,logs:Ve,installer:$e,installerSub:De,clientCmds:Ke}}return e},"readLocale"),on=yl;import{existsSync as gl,readFileSync as Al,writeFileSync as rn}from"fs";import{readFileSync as Sl,writeFileSync as Tl}from"fs";import{homedir as El}from"os";var $t=r(t=>{let o=`${El()}/${nt.CONFIG}`,s={...JSON.parse(Sl(o,"utf8")),...t},a=JSON.stringify(s,null,2);Tl(o,a)},"updateSolvConfig");import{homedir as wl}from"os";var nn=r(()=>{let e=`${wl()}/${nt.CONFIG}`;gl(e)||(rn(e,JSON.stringify(j,null,2)),console.log(`Created default config file at ${e}`));let o;try{o=JSON.parse(Al(e,"utf-8"))}catch{console.log("Error parsing config file. Renewing config file."),rn(e,JSON.stringify(j,null,2)),o=j}let n=on(o.LANG);return o.RPC_URL||(o.RPC_URL=j.RPC_URL,$t({RPC_URL:j.RPC_URL})),o.IS_MEV_MODE===void 0&&(o.IS_MEV_MODE=!1,$t({IS_MEV_MODE:!1})),o.DISCORD_WEBHOOK_URL||(o.DISCORD_WEBHOOK_URL="",$t({DISCORD_WEBHOOK_URL:""})),{config:o,locale:n}},"readOrCreateDefaultConfig");import{spawnSync as sn}from"node:child_process";var Dt=r((t=!1,e="45",o=ot,n=U,s=t?"https://api.testnet.solana.com":"https://api.mainnet-beta.solana.com",a=!1)=>{try{let i=`docker run -it --rm -v ${o}:${o} --user $(id -u):$(id -g) c29r3/solana-snapshot-finder:latest --snapshot_path ${o} --min_download_speed ${e} --version ${n} --rpc ${s}`;if(t&&a){sn(`wget --trust-server-names https://snapshots.avorio.network/testnet/snapshot.tar.bz2 https://snapshots.avorio.network/testnet/incremental-snapshot.tar.bz2 && for file in snapshot-* incremental-snapshot-*; do mv "$file" "$(echo "$file" | sed 's/\\?.*$//')"; done`,{shell:!0,stdio:"inherit",cwd:o});return}sn(i,{shell:!0,stdio:"inherit"})}catch(i){throw new Error(`getSnapshot Error: ${i}`)}},"getSnapshot");import{spawnSync as J}from"child_process";var an=r(async(t,e,o=!1)=>{let n=t.NETWORK===f.TESTNET,s=e||(n?xt:Vt);o||t.MOD?(J("git -C /home/solv/firedancer fetch origin",{shell:!0,stdio:"inherit"}),J(`git -C /home/solv/firedancer checkout v${s}-mod`,{shell:!0,stdio:"inherit"}),J("git -C /home/solv/firedancer submodule update --init --recursive",{shell:!0,stdio:"inherit"})):(J("git -C /home/solv/firedancer fetch origin",{shell:!0,stdio:"inherit"}),J(`git -C /home/solv/firedancer checkout v${s}`,{shell:!0,stdio:"inherit"}),J("git -C /home/solv/firedancer submodule update --init --recursive",{shell:!0,stdio:"inherit"})),J("rustup uninstall 1.84.1-x86_64-unknown-linux-gnu",{shell:!0,stdio:"inherit",cwd:"/home/solv/firedancer"}),J("rustup install 1.84.1",{shell:!0,stdio:"inherit",cwd:"/home/solv/firedancer"}),J("export FD_AUTO_INSTALL_PACKAGES=1 && ./deps.sh fetch check install",{shell:!0,stdio:"inherit",cwd:"/home/solv/firedancer"}),J("make -j fdctl solana",{shell:!0,stdio:"inherit",cwd:"/home/solv/firedancer"}),J("sudo systemctl restart frankendancer",{shell:!0,stdio:"inherit"}),J("sudo rm -rf /mnt/accounts/snapshot",{shell:!0,stdio:"inherit"}),J("sudo systemctl restart port-relay",{shell:!0,stdio:"inherit"})},"frankendancerUpdate");var cn=r(t=>{let e=t.NETWORK===f.TESTNET,o=t.NODE_TYPE===A.RPC,n=t.VALIDATOR_TYPE===T.JITO,s=t.VALIDATOR_TYPE===T.FRANKENDANCER,a=t.AUTO_RESTART,i=t.MOD,l=10;a&&!e&&(l=30);let c=e?B:U;n&&(c=ee,e&&(c=Nt)),s&&(c=Vt,e&&(c=xt)),o&&(c=vt,n&&(c=Yr)),h.command("update").alias("u").description("Update Command").option("-v, --version <version>",`Solana Version e.g ${c}`,c).option("-b, --background","No Monitor Delinquent Stake Update",!1).option("-c, --commission","Update Commission",!1).option("-f, --firewall","Update Firewall",!1).option("--migrate-config","Migrate Solv Config",!1).option("--config","Update Solv Config Default Solana Version",!1).option("--auto","Auto Update",!1).option("--mod","Modified Versions",!1).action(async m=>{let d=Pt(),u=e?t.TESTNET_DELINQUENT_STAKE:t.MAINNET_DELINQUENT_STAKE;if(console.log(ln.white(`Current solv version: ${d}`)),m.auto){await zr(t);return}if(m.migrateConfig){let p=nn().config,y=G.TRIPLE;p.DISK_TYPES===0?y=G.DOUBLE:p.DISK_TYPES===1?y=G.SINGLE:y=G.TRIPLE;let g=p.SOLANA_NETWORK===ft.TESTNET,S=p.SOLV_TYPE===Oe.RPC_NODE,E=p.MAINNET_TYPE===ke.JITO_MEV,$={NETWORK:g?f.TESTNET:f.MAINNET,NODE_TYPE:S?A.RPC:A.VALIDATOR,MNT_DISK_TYPE:y,RPC_TYPE:S?D.JITO:D.NONE,VALIDATOR_TYPE:E?T.JITO:g?T.AGAVE:T.SOLANA,TESTNET_SOLANA_VERSION:p.TESTNET_SOLANA_VERSION,MAINNET_SOLANA_VERSION:p.MAINNET_SOLANA_VERSION,NODE_VERSION:p.NODE_VERSION,TESTNET_DELINQUENT_STAKE:p.TESTNET_DELINQUENT_STAKE,MAINNET_DELINQUENT_STAKE:p.MAINNET_DELINQUENT_STAKE,COMMISSION:p.COMMISSION,DEFAULT_VALIDATOR_VOTE_ACCOUNT_PUBKEY:p.DEFAULT_VALIDATOR_VOTE_ACCOUNT_PUBKEY,STAKE_ACCOUNTS:p.STAKE_ACCOUNT,HARVEST_ACCOUNT:p.HARVEST_ACCOUNT,IS_MEV_MODE:p.IS_MEV_MODE,RPC_URL:p.RPC_URL,KEYPAIR_PATH:p.KEYPAIR_PATH,DISCORD_WEBHOOK_URL:p.DISCORD_WEBHOOK_URL,AUTO_UPDATE:p.AUTO_UPDATE,AUTO_RESTART:p.AUTO_RESTART,IS_DUMMY:!1,API_KEY:"",LEDGER_PATH:p.LEDGER_PATH,ACCOUNTS_PATH:"/mnt/accounts",SNAPSHOTS_PATH:"/mnt/snapshots",MOD:!1};await O($)}if(m.config){if(await O({TESTNET_SOLANA_VERSION:B,MAINNET_SOLANA_VERSION:U}),n){let p=e?Nt:ee;await Zt({version:p,tag:`v${p}`})}console.log(ln.green("\u2714\uFE0F Updated Solv Config Default Solana Version\n\n You can now run `solv i` to install the latest version"));return}if(m.firewall){await Ur();return}if(m.background){let p=m.version;if(await O({TESTNET_SOLANA_VERSION:B,MAINNET_SOLANA_VERSION:U}),n){Le(`v${p}`,m.mod||i),await Zt({version:p,tag:`v${p}`}),await Re(u,!0,l);return}if(e&&Dt(e,"10",t.SNAPSHOTS_PATH,B),s){await an(t,p,m.mod||i),await Re(u,!0,l);return}await ve(p,m.mod||i),await Re(e?5:5,!0,l);return}else if(m.commission){let p=await Kr();br(p.commission,e)}else Vr()})},"updateCommands");import{spawnSync as _l}from"node:child_process";var mn=r(t=>{try{let{log:e}=ht(),o=`tail -f ${e}`;t.error?o+=" | grep '\\(WARN\\|ERR\\)'":t.info?o+=" | grep INFO":t.warning&&(o+=" | grep WARN"),console.log(o);let n=_l(o,{shell:!0,stdio:"inherit"});if(n.error)throw n.error;n.signal==="SIGINT"?(console.log("Child process terminated due to receipt of SIGINT signal"),process.exit(0)):n.status!==0&&(console.error(`Child process exited with code ${n.status}`),process.exit(n.status))}catch(e){console.error(`tail Error: ${e}`),process.exit(1)}},"tail");var pn=r(()=>{h.command("log").description("tail logs").alias("l").description("tail logs").option("-i, --info","Follow INFO output",!1).option("-w, --warning","Follow WARN output",!1).option("-e, --error","Follow ERR/WARN output",!1).option("-a, --all","Follow All output",!1).action(t=>{mn(t)})},"logCommands");import dt from"chalk";import{spawnSync as Nl}from"child_process";import{homedir as vl}from"os";var Ue=r(t=>{let e=vl(),o=N(e),n=o.testnetValidatorVoteKey,s=o.testnetValidatorKey,a=o.testnetValidatorAuthorityKey,i=ft.TESTNET,l=t.COMMISSION;t.NETWORK===f.MAINNET&&(n=o.mainnetValidatorVoteKey,s=o.mainnetValidatorKey,a=o.mainnetValidatorAuthorityKey,i=ft.MAINNET),console.log(`\u231B\uFE0F Creating vote account with commission ${l} - ${i}`);let c=t.RPC_URL||i;t.NETWORK===f.TESTNET&&(c=ft.TESTNET);let m=`solana create-vote-account ${n} ${s} ${a} --commission ${l} --url ${c} --keypair ${s}`;Nl(m,{shell:!0,stdio:"inherit"})},"setupVoteAccount");import{spawnSync as Me}from"child_process";import{existsSync as dn,readdirSync as Rl,rmSync as Ol}from"fs";import{homedir as kl}from"os";import un from"path";var He=r(t=>{let e=[],o=0;t.NODE_TYPE===A.RPC&&(e=[I.MAINNET_VALIDATOR_KEY],o=1),t.NETWORK===f.TESTNET?(e=[I.TESTNET_VALIDATOR_KEY,I.TESTNET_VALITATOR_AUTHORITY_KEY,I.TESTNET_VALIDATOR_VOTE_KEY,I.MAINNET_VALIDATOR_KEY,I.MAINNET_VALITATOR_AUTHORITY_KEY,I.MAINNET_VALIDATOR_VOTE_KEY],o=6):(e=[I.MAINNET_VALIDATOR_KEY,I.MAINNET_VALITATOR_AUTHORITY_KEY,I.MAINNET_VALIDATOR_VOTE_KEY],o=3);let n=`solana-keygen grind --starts-and-ends-with E:SV:${o}`;Me(n,{shell:!0,stdio:"ignore"});let s=Rl("./").filter(c=>c.endsWith("SV.json")),a=kl(),i=un.join(a,"unstaked-identity.json");dn(i)&&Me(`mv ${i} ${a}/unstaked-identity.backup.json`,{shell:!0,stdio:"ignore"});let l=0;for(let c of s){let m=un.join(a,e[l]);if(l++,dn(m)){console.log(`${m} is already exist!`),Ol(c,{recursive:!0});continue}let d=`mv ${c} ${m}`;Me(d,{shell:!0,stdio:"inherit"})}Me("solana-keygen new -s --no-bip39-passphrase -o /home/solv/unstaked-identity.json",{shell:!0,stdio:"ignore"}),console.log(`Generated keypairs - ${a}`)},"createSolvKeyPairs");import{spawnSync as hn}from"child_process";var Cl=r((t,e,o,n=2001)=>{let s="/etc/systemd/system/jupiter-api.service",a=`[Unit]
|
|
8
8
|
Description=Jupiter API Service Instance
|
|
9
9
|
After=network.target
|
|
10
10
|
|
|
@@ -28,7 +28,7 @@ rm jupiter-swap-api-x86_64-unknown-linux-gnu.zip`,{shell:!0,stdio:"inherit"});le
|
|
|
28
28
|
$ solv jupiter --help`))},"jupiterAPISetup"),yn=Pl;import{existsAsync as xl}from"@skeet-framework/utils";import{readFile as Vl,writeFile as Sn}from"fs/promises";import{homedir as $l}from"os";import Dl from"path";var pt=r(async()=>{let t=$l(),e=Dl.join(t,nt.JITO_CONFIG);await xl(e)||(await Sn(e,JSON.stringify(ct,null,2)),console.log(`Created jito config file at ${e}`));let o;try{o=JSON.parse(await Vl(e,"utf-8"))}catch(n){console.log(`readOrCreateJitoConfig - ${n}`),await Sn(e,JSON.stringify(ct,null,2)),o=ct}return o},"readOrCreateJitoConfig");import{spawnSync as bl}from"child_process";var re=r(()=>{bl("sudo systemctl daemon-reload",{shell:!0,stdio:"inherit"})},"daemonReload");import ne from"chalk";import Fe from"inquirer";import Kl from"inquirer";var Tn=r(async t=>{let o=Object.keys(t?Xt.TESTNET:Xt.MAINNET),n=t?Xt.TESTNET:Xt.MAINNET,s=await Kl.prompt([{name:"commissionBps",type:"number",message:"Enter commission bps",default:1e3},{name:"region",type:"list",message:"Select region",choices:o}]),a=s.region,i=n[a];return{version:ct.version,tag:ct.tag,commissionBps:s.commissionBps,blockEngineUrl:i.BLOCK_ENGINE_URL,relayerUrl:i.RELAYER_URL,shredReceiverAddr:i.SHRED_RECEIVER_ADDR}},"askJitoSetting");var Ul=r(async()=>{try{let t=T.NONE,e=D.AGAVE,o=mt.COMMISSION,n=!1,s=await Fe.prompt([{name:"network",type:"list",message:"Choose Network",choices:Mr,default:f.MAINNET},{name:"nodeType",type:"list",message:"Choose Node Type",choices:Hr,default:A.RPC}]),a=s.network===f.TESTNET;if(s.nodeType===A.VALIDATOR){let c=s.network===f.MAINNET?[T.JITO,T.SOLANA]:[T.AGAVE,T.JITO,T.FRANKENDANCER];t=await Fe.prompt({name:"validatorType",type:"list",message:"Choose Validator Type",choices:c,default:T.AGAVE}).then(m=>m.validatorType),e=D.NONE}if(s.nodeType===A.RPC&&(e=await Fe.prompt({name:"rpcType",type:"list",message:"Choose RPC Type",choices:Fr,default:D.AGAVE}).then(c=>c.rpcType)),s.nodeType===A.VALIDATOR){let c=await Fe.prompt([{name:"commission",type:"number",message:`What is your commission rate? You can change it later (default: ${mt.COMMISSION}%)'`,default:mt.COMMISSION},{name:"isDummy",type:"confirm",message:"Do you want to setup as a dummy(Inactive) node?(\u203BFor Migration)",default:!0}]);if(o=c.commission,n=c.isDummy,t===T.JITO||t===T.FRANKENDANCER){await pt();let m=await Tn(a);await Zt(m)}}let{network:i,nodeType:l}=s;return console.log(ne.white("Network:",i)),console.log(ne.white("Node Type:",l)),console.log(ne.white("Validator Type:",t)),console.log(ne.white("RPC Type:",e)),l===A.VALIDATOR&&console.log(ne.white("Commission:",o)),await O({NETWORK:i,NODE_TYPE:l,VALIDATOR_TYPE:t,RPC_TYPE:e,COMMISSION:o,IS_DUMMY:n}),!0}catch(t){throw new Error(t)}},"initialConfigSetup"),En=Ul;import{spawnSync as gn}from"child_process";var se=r((t=Nt,e=!1)=>{if(e){let o=`v${t}-mod`;gn(`sh -c "$(curl --netrc-optional -sSfL https://raw.githubusercontent.com/gabrielhicks/jito-solana/${o}/installer)"`,{shell:!0,stdio:"inherit"})}else{let o=`v${t}-jito`;gn(`sh -c "$(curl --netrc-optional -sSfL https://raw.githubusercontent.com/jito-foundation/jito-solana/${o}/installer)"`,{shell:!0,stdio:"inherit"})}},"installJito");var An=r(()=>`#!/bin/bash
|
|
29
29
|
exec agave-validator \\
|
|
30
30
|
--identity ${R} \\
|
|
31
|
-
--log ${
|
|
31
|
+
--log ${W} \\
|
|
32
32
|
--accounts ${It} \\
|
|
33
33
|
--ledger ${w} \\
|
|
34
34
|
--snapshots ${ot} \\
|
|
@@ -67,7 +67,7 @@ exec agave-validator \\
|
|
|
67
67
|
`,"startJitoRPCScript");import{existsAsync as Fl}from"@skeet-framework/utils";import{writeFile as Yl}from"fs/promises";import{spawnSync as Ml}from"node:child_process";var Hl=r(()=>{let t=`sudo chmod +x ${et}`;Ml(t,{shell:!0,stdio:"inherit"})},"updateStartupScriptPermission"),ae=Hl;var wn=r(()=>`#!/bin/bash
|
|
68
68
|
exec agave-validator \\
|
|
69
69
|
--identity ${R} \\
|
|
70
|
-
--log ${
|
|
70
|
+
--log ${W} \\
|
|
71
71
|
--accounts ${It} \\
|
|
72
72
|
--ledger ${w} \\
|
|
73
73
|
--snapshots ${ot} \\
|
|
@@ -105,7 +105,7 @@ exec ${a} \\
|
|
|
105
105
|
--identity ${R} \\
|
|
106
106
|
--vote-account ${ge} \\
|
|
107
107
|
--authorized-voter ${b} \\
|
|
108
|
-
--log ${
|
|
108
|
+
--log ${W} \\
|
|
109
109
|
--accounts ${s.ACCOUNTS_PATH} \\
|
|
110
110
|
--ledger ${s.LEDGER_PATH} \\
|
|
111
111
|
--snapshots ${s.SNAPSHOTS_PATH} \\
|
|
@@ -140,7 +140,7 @@ exec ${a} \\
|
|
|
140
140
|
--identity ${R} \\
|
|
141
141
|
--vote-account ${Ae} \\
|
|
142
142
|
--authorized-voter ${x} \\
|
|
143
|
-
--log ${
|
|
143
|
+
--log ${W} \\
|
|
144
144
|
--accounts ${s.ACCOUNTS_PATH} \\
|
|
145
145
|
--ledger ${s.LEDGER_PATH} \\
|
|
146
146
|
--snapshots ${s.SNAPSHOTS_PATH} \\
|
|
@@ -174,7 +174,7 @@ exec ${e} \\
|
|
|
174
174
|
--identity ${R} \\
|
|
175
175
|
--vote-account ${ge} \\
|
|
176
176
|
--authorized-voter ${b} \\
|
|
177
|
-
--log ${
|
|
177
|
+
--log ${W} \\
|
|
178
178
|
--accounts ${t.ACCOUNTS_PATH} \\
|
|
179
179
|
--ledger ${t.LEDGER_PATH} \\
|
|
180
180
|
--snapshots ${t.SNAPSHOTS_PATH} \\
|
|
@@ -204,7 +204,7 @@ exec agave-validator \\
|
|
|
204
204
|
--identity ${R} \\
|
|
205
205
|
--vote-account ${Ae} \\
|
|
206
206
|
--authorized-voter ${x} \\
|
|
207
|
-
--log ${
|
|
207
|
+
--log ${W} \\
|
|
208
208
|
--accounts ${t.ACCOUNTS_PATH} \\
|
|
209
209
|
--ledger ${t.LEDGER_PATH} \\
|
|
210
210
|
--snapshots ${t.SNAPSHOTS_PATH} \\
|
|
@@ -640,18 +640,18 @@ AUTO UPDATE: If you enable this, solv will update automatically when the solv ve
|
|
|
640
640
|
|
|
641
641
|
AUTO RESTART: If you enable this, solv will restart automatically when the solana version is updated.
|
|
642
642
|
\u203B Please turn off if you are using no-downtime migration.
|
|
643
|
-
`;console.log(Da.white(n));let s=await fo.prompt([{type:"confirm",name:"autoUpdate",message:"Do you want to enable AUTO UPDATE? (Recommended)",default:!1},{type:"confirm",name:"autoRestart",message:"Do you want to enable AUTO RESTART?",default:!1}]),a=t.RPC_URL,i="",l=await fo.prompt([{type:"input",name:"discordWebhookUrl",message:"Enter your Discord Webhook URL",default:t.DISCORD_WEBHOOK_URL}]);return e?i="":a=(await fo.prompt([{type:"input",name:"rpcUrl",message:"Enter your RPC URL",default:t.RPC_URL}])).rpcUrl,await O({HARVEST_ACCOUNT:i,IS_MEV_MODE:o.mevOn,RPC_URL:a,DISCORD_WEBHOOK_URL:l.discordWebhookUrl,AUTO_UPDATE:s.autoUpdate,AUTO_RESTART:s.autoRestart}),!0},"mevOn"),ba=Hp;import{spawnSync as Jp}from"node:child_process";import{Connection as jp}from"@solana/web3.js";import{Connection as Fp}from"@solana/web3.js";var Yp=r(async(t,e=10,o=.4)=>{try{let s=await new Fp(t).getRecentPerformanceSamples(e);if(s.length===0)return console.warn("No performance samples available. Using fallback slot time."),o;let a=s.filter(l=>l.numSlots!==0);return a.length===0?(console.warn("All performance samples have numSlots equal to 0. Using fallback slot time."),o):a.reduce((l,c)=>l+c.samplePeriodSecs/c.numSlots,0)/a.length}catch(n){return console.error(`getAverageSlotTime failed: ${n}. Using fallback slot time.`),o}},"getAverageSlotTime"),Ka=Yp;var Qo=r(async t=>{try{let o=await new jp(t).getEpochInfo();if(o.slotsInEpoch===0)throw new Error("slotsInEpoch is 0, causing division by zero.");let n=await Ka(t);console.log("timePerSlotSeconds",n);let a=(o.slotsInEpoch-o.slotIndex)*n,i=(o.slotIndex/o.slotsInEpoch*100).toFixed(2),l=Math.floor(a/(3600*24)),c=Math.floor(a%(3600*24)/3600),m=Math.floor(a%3600/60),d=Math.floor(a%60),u=`${l}d ${c}h ${m}m ${d}s`;return l===0&&(u=`${c}h ${m}m ${d}s`),{...o,estimatedTimeUntilNextEpoch:u,displayRatio:i}}catch(e){throw new Error(`getEpochInfo failed: ${e}`)}},"getEpochInfo");var zp=.03,Ua=r(t=>{h.command("harvest").alias("hv").description("Harvest SOL from Validator Account to Authority Account").action(async()=>{let e=await Wp(t),{mainnetValidatorAuthorityKey:o}=N();console.log("Harvesting SOL..."),await zo(t.RPC_URL);let n=await at(t.RPC_URL,Q.VOTE),s=0;for(;n>1&&s<3;)console.log("Retrying Harvesting SOL..."),await M(1e3),await zo(t.RPC_URL),n=await at(t.RPC_URL,Q.VOTE),s++;let a=JSON.parse(await Gp(o,"utf-8")),i=await at(t.RPC_URL,Q.AUTH);if(i<1)console.log(ho.white("Authority Account Balance is less than 1 SOL")),console.log(ho.white("Skip converting SOL to elSOL"));else{let c=i-zp;if(c=Math.round(c*1e9)/1e9,console.log(`Converting ${c} SOL to elSOL`),!await no(t.RPC_URL,Z,c,a))throw new Error("Failed to convert SOL to elSOL")}let l=await va(t.RPC_URL);if(l<1){let c=await Qo(t.RPC_URL);console.log("elSOL Balance is less than 1 elSOL");let m=`elSOL Balance is less than 1 elSOL for ${c.epoch}`;await
|
|
643
|
+
`;console.log(Da.white(n));let s=await fo.prompt([{type:"confirm",name:"autoUpdate",message:"Do you want to enable AUTO UPDATE? (Recommended)",default:!1},{type:"confirm",name:"autoRestart",message:"Do you want to enable AUTO RESTART?",default:!1}]),a=t.RPC_URL,i="",l=await fo.prompt([{type:"input",name:"discordWebhookUrl",message:"Enter your Discord Webhook URL",default:t.DISCORD_WEBHOOK_URL}]);return e?i="":a=(await fo.prompt([{type:"input",name:"rpcUrl",message:"Enter your RPC URL",default:t.RPC_URL}])).rpcUrl,await O({HARVEST_ACCOUNT:i,IS_MEV_MODE:o.mevOn,RPC_URL:a,DISCORD_WEBHOOK_URL:l.discordWebhookUrl,AUTO_UPDATE:s.autoUpdate,AUTO_RESTART:s.autoRestart}),!0},"mevOn"),ba=Hp;import{spawnSync as Jp}from"node:child_process";import{Connection as jp}from"@solana/web3.js";import{Connection as Fp}from"@solana/web3.js";var Yp=r(async(t,e=10,o=.4)=>{try{let s=await new Fp(t).getRecentPerformanceSamples(e);if(s.length===0)return console.warn("No performance samples available. Using fallback slot time."),o;let a=s.filter(l=>l.numSlots!==0);return a.length===0?(console.warn("All performance samples have numSlots equal to 0. Using fallback slot time."),o):a.reduce((l,c)=>l+c.samplePeriodSecs/c.numSlots,0)/a.length}catch(n){return console.error(`getAverageSlotTime failed: ${n}. Using fallback slot time.`),o}},"getAverageSlotTime"),Ka=Yp;var Qo=r(async t=>{try{let o=await new jp(t).getEpochInfo();if(o.slotsInEpoch===0)throw new Error("slotsInEpoch is 0, causing division by zero.");let n=await Ka(t);console.log("timePerSlotSeconds",n);let a=(o.slotsInEpoch-o.slotIndex)*n,i=(o.slotIndex/o.slotsInEpoch*100).toFixed(2),l=Math.floor(a/(3600*24)),c=Math.floor(a%(3600*24)/3600),m=Math.floor(a%3600/60),d=Math.floor(a%60),u=`${l}d ${c}h ${m}m ${d}s`;return l===0&&(u=`${c}h ${m}m ${d}s`),{...o,estimatedTimeUntilNextEpoch:u,displayRatio:i}}catch(e){throw new Error(`getEpochInfo failed: ${e}`)}},"getEpochInfo");var zp=.03,Ua=r(t=>{h.command("harvest").alias("hv").description("Harvest SOL from Validator Account to Authority Account").action(async()=>{let e=await Wp(t),{mainnetValidatorAuthorityKey:o}=N();console.log("Harvesting SOL..."),await zo(t.RPC_URL);let n=await at(t.RPC_URL,Q.VOTE),s=0;for(;n>1&&s<3;)console.log("Retrying Harvesting SOL..."),await M(1e3),await zo(t.RPC_URL),n=await at(t.RPC_URL,Q.VOTE),s++;let a=JSON.parse(await Gp(o,"utf-8")),i=await at(t.RPC_URL,Q.AUTH);if(i<1)console.log(ho.white("Authority Account Balance is less than 1 SOL")),console.log(ho.white("Skip converting SOL to elSOL"));else{let c=i-zp;if(c=Math.round(c*1e9)/1e9,console.log(`Converting ${c} SOL to elSOL`),!await no(t.RPC_URL,Z,c,a))throw new Error("Failed to convert SOL to elSOL")}let l=await va(t.RPC_URL);if(l<1){let c=await Qo(t.RPC_URL);console.log("elSOL Balance is less than 1 elSOL");let m=`elSOL Balance is less than 1 elSOL for ${c.epoch}`;await q(m),process.exit(0)}if(console.log(`Transferring ${l} elSOL to Harvest Address`),await Pa(t.RPC_URL,a,e,l,st,Ir),t.IS_MEV_MODE){let m=`\u{1F4B0} Harvested Rewards for ${(await Qo(t.RPC_URL)).epoch} \u{1F4B0}
|
|
644
644
|
Validator Address: ${v(o)}
|
|
645
645
|
Total Reward: ${l} elSOL
|
|
646
|
-
Harvest Address: ${e}`;await
|
|
646
|
+
Harvest Address: ${e}`;await q(m)}console.log(ho.green("\u2714\uFE0E Successfully Harvested SOL")),process.exit(0)}),h.command("auto").alias("mev").description("Enable Auto Operation Mode").action(async()=>{await ba(t)&&(Jp("solv cron epoch",{stdio:"inherit",shell:!0}),console.log(ho.green("\u2714\uFE0E Auto Operation Mode Enabled"))),process.exit(0)})},"harvestCommands"),Wp=r(async t=>{try{let e=t.HARVEST_ACCOUNT;if(e==="")throw new Error("Harvest Address not found");return e}catch{let o=await Bp.prompt([{type:"input",name:"harvestAddress",message:"Enter Harvest Address",validate:Go}]);return await O({HARVEST_ACCOUNT:o.harvestAddress}),o.harvestAddress}},"getHarvestAddress");import{format as ud}from"@skeet-framework/utils";import{writeFile as qp}from"fs/promises";var Qp=r(async t=>{await qp(Ce,JSON.stringify({...t},null,2),"utf-8")},"writeEpochDataToFile"),Et=Qp;var Xp=r(async(t,e,o,n)=>{t<24*60&&t>=8*60&&!e.isLessThan1Day&&await Et({...e,isLessThan1Day:!0})},"isLessThan1Day"),Ma=Xp;var Zp=r(async(t,e,o,n)=>{t<8*60&&t>=60&&!e.isLessThan8Hours&&await Et({...e,isLessThan8Hours:!0})},"lessThan8Hour"),Ha=Zp;var td=r(async(t,e,o,n)=>t<60&&!e.isLessThan1Hour?(await Et({...e,isLessThan1Hour:!0}),!0):!1,"lessThan1Hour"),Fa=td;var ed=r(async(t,e)=>{let o=e.NETWORK===f.TESTNET,n={epoch:t.epoch,isLessThan1Hour:!1,isLessThan8Hours:!1,isLessThan1Day:!1},{mainnetValidatorKey:s,testnetValidatorKey:a}=N(),i=o?v(a):v(s);await Et(n),console.log("Epoch has been updated!");let l=`===\u23F3 ${t.epoch} \u23F3===
|
|
647
647
|
Validator: ${i}
|
|
648
648
|
Network: ${e.NETWORK}
|
|
649
649
|
CurrentEpoch: ${t.epoch}
|
|
650
650
|
Epoch has been updated!
|
|
651
651
|
Until Next Epoch: Approximately 2 days`;return"Epoch has been updated!"},"newEpoch"),Ya=ed;import{existsAsync as od}from"@skeet-framework/utils";import{readFile as rd,writeFile as nd}from"fs/promises";import sd from"chalk";import{homedir as ad}from"os";var id=r(async()=>{let e=ad().includes("/home/solv")?Ce:"./currentEpoch.json";if(await od(e))return JSON.parse(await rd(e,"utf-8"));let o={epoch:0,isLessThan1Hour:!1,isLessThan8Hours:!1,isLessThan1Day:!1};return await nd(e,JSON.stringify(o,null,2),"utf-8"),console.log(sd.white("\u2714\uFE0F Initial epoch data has been created!")),o},"initOrReadEpochFile"),ja=id;import ld from"chalk";var cd=r(async t=>{let e=t.RPC_URL,o=t.NETWORK===f.TESTNET;if(o&&(e=lr),await at(e,Q.VALIDATOR,o)<Ro){let{mainnetValidatorKey:s,testnetValidatorKey:a}=N(),i=o?v(a):v(s),l=`\u26A0\uFE0F Validator Account Balance is less than ${Ro} SOL
|
|
652
652
|
Please top up your Validator Account
|
|
653
|
-
Address: ${i}`;return await
|
|
654
|
-
`),a=s.find(p=>p.includes("Epoch Completed Time:")),i=s.find(p=>p.includes("Epoch Completed Percent:"))?.replace("Epoch Completed Percent:",""),l=Number(s.find(p=>p.includes("Epoch:"))?.replace("Epoch:",""));if(!a||!i||!l)throw new Error("Epoch Completed Time not found");let m=a.split("(")[1].replace(" remaining)","");console.log("remainingTime:",m);let d=/(?:(\d+)day\s*)?(?:(\d+)h\s*)?(?:(\d+)m\s*)?(?:(\d+)s\s*)?/,u=m.match(d);if(u){let p=u[1]?parseInt(u[1]):0,y=u[2]?parseInt(u[2]):0,g=u[3]?parseInt(u[3]):0,S=u[4]?parseInt(u[4]):0,E=p*24*60+y*60+g+Math.floor(S/60);return{epoch:l,day:p,hour:y,min:g,sec:S,totalMinutes:E,epochRemainingTime:m,epochCompletedPercent:i}}else throw new Error("Time information could not be parsed")}catch(e){throw new Error(`getEpochInfoByRust failed: ${e}`)}},"getEpochInfoByRust");var hd=r(async t=>{let e=t.NETWORK===f.TESTNET,o=e?Ie:t.RPC_URL,n=ud(new Date,"yyyy-MM-dd HH:mm:ss");console.log(`Checking Epoch at ${n}`);let s=await ja(),a=za(o),{mainnetValidatorVoteKey:i,testnetValidatorVoteKey:l}=N(),m=await oe(o,v(e?l:i));if(console.log(`Validator is active: ${m.isActive}`),await Ga(t),!await Ja()&&t.AUTO_UPDATE)return console.log("Found new version of solv! Updating..."),fd("solv update && solv update --auto",{stdio:"inherit",shell:!0}),"Node has been restarted!";if(s.epoch<a.epoch)return await Ya(a,t),"Epoch has been updated!";let u=a.totalMinutes,p=[Fa,Ha,Ma];for(let y of p)if(await y(u,s,a,t))break;return"Epoch has not been changed!"},"epochTimer"),Wa=hd;var qa=r(t=>{h.command("epochTimer").description("Check Solana Epoch Timer").action(async()=>{await Wa(t),process.exit(0)})},"epochTimerCommands");import mi from"inquirer";import{join as ti}from"path";import{spawnSync as Gt}from"node:child_process";import
|
|
653
|
+
Address: ${i}`;return await q(l),!1}return console.log(ld.green("\u2714\uFE0F Validator Account Balance is sufficient")),!0},"checkBalance"),Ga=cd;async function md(t="@gabrielhicks/solv"){try{let e=`https://registry.npmjs.org/${t}`,o=await fetch(e);if(!o.ok)throw new Error(`HTTP error! status: ${o.status}`);return(await o.json())["dist-tags"].latest}catch(e){return console.error(`Error fetching latest version for package ${t}:`,e),null}}r(md,"getNpmLatestVersion");var Ba=md;async function pd(){let t=Pt(),e=await Ba();if(!e)throw new Error("Failed to get NPM API");return console.log("currentVersion:",t),console.log("latestVersion:",e),t===e}r(pd,"isVersionSame");var Ja=pd;import{spawnSync as fd}from"child_process";import{spawnSync as dd}from"node:child_process";var za=r(t=>{try{let e=`solana epoch-info --url '${t}'`,{stdout:o}=dd(e,{shell:!0,stdio:"pipe"}),s=o.toString().split(`
|
|
654
|
+
`),a=s.find(p=>p.includes("Epoch Completed Time:")),i=s.find(p=>p.includes("Epoch Completed Percent:"))?.replace("Epoch Completed Percent:",""),l=Number(s.find(p=>p.includes("Epoch:"))?.replace("Epoch:",""));if(!a||!i||!l)throw new Error("Epoch Completed Time not found");let m=a.split("(")[1].replace(" remaining)","");console.log("remainingTime:",m);let d=/(?:(\d+)day\s*)?(?:(\d+)h\s*)?(?:(\d+)m\s*)?(?:(\d+)s\s*)?/,u=m.match(d);if(u){let p=u[1]?parseInt(u[1]):0,y=u[2]?parseInt(u[2]):0,g=u[3]?parseInt(u[3]):0,S=u[4]?parseInt(u[4]):0,E=p*24*60+y*60+g+Math.floor(S/60);return{epoch:l,day:p,hour:y,min:g,sec:S,totalMinutes:E,epochRemainingTime:m,epochCompletedPercent:i}}else throw new Error("Time information could not be parsed")}catch(e){throw new Error(`getEpochInfoByRust failed: ${e}`)}},"getEpochInfoByRust");var hd=r(async t=>{let e=t.NETWORK===f.TESTNET,o=e?Ie:t.RPC_URL,n=ud(new Date,"yyyy-MM-dd HH:mm:ss");console.log(`Checking Epoch at ${n}`);let s=await ja(),a=za(o),{mainnetValidatorVoteKey:i,testnetValidatorVoteKey:l}=N(),m=await oe(o,v(e?l:i));if(console.log(`Validator is active: ${m.isActive}`),await Ga(t),!await Ja()&&t.AUTO_UPDATE)return console.log("Found new version of solv! Updating..."),fd("solv update && solv update --auto",{stdio:"inherit",shell:!0}),"Node has been restarted!";if(s.epoch<a.epoch)return await Ya(a,t),"Epoch has been updated!";let u=a.totalMinutes,p=[Fa,Ha,Ma];for(let y of p)if(await y(u,s,a,t))break;return"Epoch has not been changed!"},"epochTimer"),Wa=hd;var qa=r(t=>{h.command("epochTimer").description("Check Solana Epoch Timer").action(async()=>{await Wa(t),process.exit(0)})},"epochTimerCommands");import mi from"inquirer";import{join as ti}from"path";import{spawnSync as Gt}from"node:child_process";import z from"chalk";import{spawnSync as yd}from"node:child_process";var Sd=r((t,e,o,n="pipe",s="~/.ssh/id_rsa")=>{let a;try{let i=yd(`ssh -i ${s} -o StrictHostKeyChecking=no solv@${t} -p 22 'cd ~ && source ~/.profile && ${e}'`,{shell:!0,stdio:n});return i.status!==0?(console.log(`\u26A0\uFE0F CMD Failed. Please check your SSH connection.
|
|
655
655
|
$ ssh solv@${t}
|
|
656
656
|
|
|
657
657
|
Failed Cmd: ${e}`),a={status:i.status,stdout:String(i.stdout),stderr:i.stderr.toString()},a):(a={status:i.status,stdout:i.stdout.toString(),stderr:i.stderr.toString()},a)}catch(i){return console.log(`scpSSH Error: ${i}`),a={status:null,stdout:"",stderr:String(i)},a}},"scpSSH"),yo=Sd;import Qa from"chalk";var Td=r((t,e,o)=>{console.log(Qa.white("\u{1F50D} Checking If Destination Validator Key is the same..."));let n=v(t).trim(),s=yo(e,`solana-keygen pubkey ${t}`,o).stdout.toString().trim();return n!==s?(console.log(Qa.yellow(`\u26A0\uFE0F Destination Identity Key is different.
|
|
@@ -659,24 +659,24 @@ Please check your Validator
|
|
|
659
659
|
$ ssh ${o}@${e}
|
|
660
660
|
|
|
661
661
|
Local Identity Key: ${n}
|
|
662
|
-
Destination Identity Key: ${s}`)),!1):!0},"checkValidatorKey"),Yt=Td;var Ed="agave-validator -l /mnt/ledger",gd="sudo fdctl",Ad="--config /home/solv/firedancer/config.toml ",wd=r(t=>t==="agave"?[Ed,""]:[gd,Ad],"getSolanaCLIActive"),jt=wd;var Xa="agave-validator -l /mnt/ledger",_d=r(()=>{try{return Xa}catch(t){return console.error(t),Xa}},"getSolanaCLIAgave"),So=_d;import Xo from"chalk";var To=r(async(t,e)=>{try{console.log(Xo.white("\u{1F50D} Detecting client type from remote configuration..."));let o=yo(t,"cat /home/solv/solv4.config.json",e,"pipe");if(o.status!==0)return{client:"agave",validatorType:T.AGAVE,success:!1,error:"Could not read remote configuration file"};let s=JSON.parse(o.stdout).VALIDATOR_TYPE,a;switch(s){case T.AGAVE:a="agave";break;case T.FRANKENDANCER:a="frankendancer";break;case T.JITO:a="agave";break;default:a="agave"}return console.log(Xo.green(`\u2705 Detected remote client type: ${a} (${s})`)),{client:a,validatorType:s,success:!0}}catch(o){return console.log(Xo.yellow(`\u26A0\uFE0F Could not auto-detect client type: ${o}`)),{client:"agave",validatorType:T.AGAVE,success:!1,error:String(o)}}},"getRemoteClientType");import{readFile as Nd}from"fs/promises";import Zo from"chalk";import{existsSync as vd}from"fs";var Eo=r(async()=>{try{console.log(Zo.white("\u{1F50D} Detecting local client type from configuration..."));let t="/home/solv/solv4.config.json";if(!vd(t))return{client:"agave",validatorType:T.AGAVE,success:!1,error:"Local configuration file not found"};let e=await Nd(t,"utf-8"),n=JSON.parse(e).VALIDATOR_TYPE,s;switch(n){case T.AGAVE:s="agave";break;case T.FRANKENDANCER:s="frankendancer";break;case T.JITO:s="agave";break;default:s="agave"}return console.log(Zo.green(`\u2705 Detected local client type: ${s} (${n})`)),{client:s,validatorType:n,success:!0}}catch(t){return console.log(Zo.yellow(`\u26A0\uFE0F Could not auto-detect local client type: ${t}`)),{client:"agave",validatorType:T.AGAVE,success:!1,error:String(t)}}},"getLocalClientType");var go=ti(P,wt),Za=ti(P,At),ei=r(async(t,e,o,n,s=!0)=>{let a=o.NETWORK===f.TESTNET,i=o.NODE_TYPE===A.RPC,l=a?x:b;i&&(l=x);let c=await Eo(),m=await To(t,n),d=c.success?c.client:"agave",u=m.success?m.client:"agave";console.log(
|
|
662
|
+
Destination Identity Key: ${s}`)),!1):!0},"checkValidatorKey"),Yt=Td;var Ed="agave-validator -l /mnt/ledger",gd="sudo fdctl",Ad="--config /home/solv/firedancer/config.toml ",wd=r(t=>t==="agave"?[Ed,""]:[gd,Ad],"getSolanaCLIActive"),jt=wd;var Xa="agave-validator -l /mnt/ledger",_d=r(()=>{try{return Xa}catch(t){return console.error(t),Xa}},"getSolanaCLIAgave"),So=_d;import Xo from"chalk";var To=r(async(t,e)=>{try{console.log(Xo.white("\u{1F50D} Detecting client type from remote configuration..."));let o=yo(t,"cat /home/solv/solv4.config.json",e,"pipe");if(o.status!==0)return{client:"agave",validatorType:T.AGAVE,success:!1,error:"Could not read remote configuration file"};let s=JSON.parse(o.stdout).VALIDATOR_TYPE,a;switch(s){case T.AGAVE:a="agave";break;case T.FRANKENDANCER:a="frankendancer";break;case T.JITO:a="agave";break;default:a="agave"}return console.log(Xo.green(`\u2705 Detected remote client type: ${a} (${s})`)),{client:a,validatorType:s,success:!0}}catch(o){return console.log(Xo.yellow(`\u26A0\uFE0F Could not auto-detect client type: ${o}`)),{client:"agave",validatorType:T.AGAVE,success:!1,error:String(o)}}},"getRemoteClientType");import{readFile as Nd}from"fs/promises";import Zo from"chalk";import{existsSync as vd}from"fs";var Eo=r(async()=>{try{console.log(Zo.white("\u{1F50D} Detecting local client type from configuration..."));let t="/home/solv/solv4.config.json";if(!vd(t))return{client:"agave",validatorType:T.AGAVE,success:!1,error:"Local configuration file not found"};let e=await Nd(t,"utf-8"),n=JSON.parse(e).VALIDATOR_TYPE,s;switch(n){case T.AGAVE:s="agave";break;case T.FRANKENDANCER:s="frankendancer";break;case T.JITO:s="agave";break;default:s="agave"}return console.log(Zo.green(`\u2705 Detected local client type: ${s} (${n})`)),{client:s,validatorType:n,success:!0}}catch(t){return console.log(Zo.yellow(`\u26A0\uFE0F Could not auto-detect local client type: ${t}`)),{client:"agave",validatorType:T.AGAVE,success:!1,error:String(t)}}},"getLocalClientType");var go=ti(P,wt),Za=ti(P,At),ei=r(async(t,e,o,n,s=!0)=>{let a=o.NETWORK===f.TESTNET,i=o.NODE_TYPE===A.RPC,l=a?x:b;i&&(l=x);let c=await Eo(),m=await To(t,n),d=c.success?c.client:"agave",u=m.success?m.client:"agave";console.log(z.green(`\u2705 Local client: ${d}, Remote client: ${u}`));let[p,y]=jt(d),[g,S]=jt(u),E=So();if(!Yt(l,t,n))return;if(s){console.log(z.white("\u{1F7E2} Waiting for restart window..."));let qt=`ssh -i ~/.ssh/id_rsa -o StrictHostKeyChecking=no ${n}@${t} -p 22 'cd ~ && source ~/.profile && ${E} wait-for-restart-window --min-idle-time 2 --skip-new-snapshot-check'`;if(Gt(qt,{shell:!0,stdio:"inherit"}).status!==0){console.log(z.yellow(`\u26A0\uFE0F wait-for-restart-window Failed. Please check your Validator
|
|
663
663
|
$ ssh ${n}@${t}
|
|
664
664
|
|
|
665
|
-
Failed Cmd: ${E} wait-for-restart-window --min-idle-time 2 --skip-new-snapshot-check`));return}}console.log(
|
|
665
|
+
Failed Cmd: ${E} wait-for-restart-window --min-idle-time 2 --skip-new-snapshot-check`));return}}console.log(z.white("\u{1F7E2} Setting identity on the remote validator..."));let k=`ssh -i ~/.ssh/id_rsa -o StrictHostKeyChecking=no ${n}@${t} -p 22 'cd ~ && source ~/.profile && ${g} set-identity ${S}${go}'`;if(Gt(k,{shell:!0,stdio:"inherit"}).status!==0){console.log(z.yellow(`\u26A0\uFE0F Set Identity Failed. Please check your Validator
|
|
666
666
|
$ ssh ${n}@${t}
|
|
667
667
|
|
|
668
|
-
Failed Cmd: ${g} set-identity ${S}${go}`));return}if(console.log(
|
|
668
|
+
Failed Cmd: ${g} set-identity ${S}${go}`));return}if(console.log(z.white("\u{1F7E2} Changing the Symlink to the new validator keypair...")),Gt(`ssh -i ~/.ssh/id_rsa -o StrictHostKeyChecking=no ${n}@${t} -p 22 'cd ~ && source ~/.profile && ln -sf ${go} ${Za}'`,{shell:!0,stdio:"inherit"}).status!==0){console.log(z.yellow(`\u26A0\uFE0F Chaning Identity Key Symlink Failed. Please check your Validator
|
|
669
669
|
$ ssh ${n}@${t}
|
|
670
670
|
|
|
671
|
-
Failed Cmd: ln -sf ${go} ${Za}`));return}if(console.log(
|
|
671
|
+
Failed Cmd: ln -sf ${go} ${Za}`));return}if(console.log(z.white("\u{1F7E2} Uploading the tower file to the new validator...")),Gt(`scp ${n}@${t}:${w}/tower-1_9-${e}.bin ${w}`,{shell:!0,stdio:"inherit"}).status!==0){console.log(z.yellow(`\u26A0\uFE0F Upload Tower File Failed. Please check your tower file
|
|
672
672
|
$ ssh ${n}@${t}
|
|
673
673
|
|
|
674
|
-
Failed Cmd: scp ${n}@${t}:${w}/tower-1_9-${e}.bin ${w}`));return}if(console.log(
|
|
674
|
+
Failed Cmd: scp ${n}@${t}:${w}/tower-1_9-${e}.bin ${w}`));return}if(console.log(z.white("\u{1F7E2} Setting identity on the local validator...")),Gt(`${p} set-identity ${y}--require-tower ${l}`,{shell:!0,stdio:"inherit"}).status!==0){console.log(z.yellow(`\u26A0\uFE0F Set Identity Failed. Please check your Validator
|
|
675
675
|
|
|
676
676
|
Failed Cmd: ${p} set-identity ${y}${l}
|
|
677
|
-
ln -sf ${l} ${R}`));return}if(Gt(`ln -sf ${l} ${R}`,{shell:!0,stdio:"inherit"}).status!==0){console.log(
|
|
677
|
+
ln -sf ${l} ${R}`));return}if(Gt(`ln -sf ${l} ${R}`,{shell:!0,stdio:"inherit"}).status!==0){console.log(z.yellow(`\u26A0\uFE0F Chaning Identity Key Symlink Failed. Please check your Validator
|
|
678
678
|
|
|
679
|
-
Failed Cmd: ln -sf ${l} ${R}`));return}console.log(
|
|
679
|
+
Failed Cmd: ln -sf ${l} ${R}`));return}console.log(z.white("\u{1F7E2} Identity changed successfully!")),await O({IS_DUMMY:!1})},"changeIdentityIncoming");import{join as ni}from"path";import H from"chalk";import{spawnSync as Bt}from"node:child_process";var oi=ni(P,wt),Rd=ni(P,At),ri="~/.ssh/id_rsa",si=r(async(t,e,o,n,s=!0)=>{let a=o.NETWORK===f.TESTNET,i=o.NODE_TYPE===A.RPC,l=a?x:b;i&&(l=x);let c=await Eo(),m=await To(t,n),d=c.success?c.client:"agave",u=m.success?m.client:"agave";console.log(H.green(`\u2705 Local client: ${d}, Remote client: ${u}`));let[p,y]=jt(d),[g,S]=jt(u),E=So();if(!Yt(l,t,n))return;let k=`${E} wait-for-restart-window --min-idle-time 2 --skip-new-snapshot-check`,Y=`${p} set-identity ${y}${oi}`,it=`ln -sf ${oi} ${Rd}`,gt=`scp ${w}/tower-1_9-${e}.bin ${n}@${t}:${w}`,lt=`${g} set-identity ${S}--require-tower ${l}`,Wt=`ln -sf ${l} ${R}`;if(s&&(console.log(H.white("\u{1F7E2} Waiting for restart window...")),Bt(k,{shell:!0,stdio:"inherit"}).status!==0)){console.log(H.yellow(`\u26A0\uFE0F wait-for-restart-window Failed. Please check your Validator
|
|
680
680
|
|
|
681
681
|
Failed Cmd: ${k}`));return}if(console.log(H.white("\u{1F7E2} Setting identity on the new validator...")),Bt(Y,{shell:!0,stdio:"inherit"}).status!==0){console.log(H.yellow(`\u26A0\uFE0F set-identity Failed. Please check your Validator
|
|
682
682
|
|