Files
prysm/tools/unencrypted-keys-gen/main.go
Preston Van Loon 2fd6bd8150 Add golang.org/x/tools modernize static analyzer and fix violations (#15946)
* Ran gopls modernize to fix everything

go run golang.org/x/tools/gopls/internal/analysis/modernize/cmd/modernize@latest -fix -test ./...

* Override rules_go provided dependency for golang.org/x/tools to v0.38.0.

To update this, checked out rules_go, then ran `bazel run //go/tools/releaser -- upgrade-dep -mirror=false org_golang_x_tools` and copied the patches.

* Fix buildtag violations and ignore buildtag violations in external

* Introduce modernize analyzer package.

* Add modernize "any" analyzer.

* Fix violations of any analyzer

* Add modernize "appendclipped" analyzer.

* Fix violations of appendclipped

* Add modernize "bloop" analyzer.

* Add modernize "fmtappendf" analyzer.

* Add modernize "forvar" analyzer.

* Add modernize "mapsloop" analyzer.

* Add modernize "minmax" analyzer.

* Fix violations of minmax analyzer

* Add modernize "omitzero" analyzer.

* Add modernize "rangeint" analyzer.

* Fix violations of rangeint.

* Add modernize "reflecttypefor" analyzer.

* Fix violations of reflecttypefor analyzer.

* Add modernize "slicescontains" analyzer.

* Add modernize "slicessort" analyzer.

* Add modernize "slicesdelete" analyzer. This is disabled by default for now. See https://go.dev/issue/73686.

* Add modernize "stringscutprefix" analyzer.

* Add modernize "stringsbuilder" analyzer.

* Fix violations of stringsbuilder analyzer.

* Add modernize "stringsseq" analyzer.

* Add modernize "testingcontext" analyzer.

* Add modernize "waitgroup" analyzer.

* Changelog fragment

* gofmt

* gazelle

* Add modernize "newexpr" analyzer.

* Disable newexpr until go1.26

* Add more details in WORKSPACE on how to update the override

* @nalepae feedback on min()

* gofmt

* Fix violations of forvar
2025-11-14 01:27:22 +00:00

103 lines
2.4 KiB
Go

package main
import (
"flag"
"log"
"os"
"github.com/OffchainLabs/prysm/v7/crypto/bls"
"github.com/OffchainLabs/prysm/v7/runtime/interop"
"github.com/OffchainLabs/prysm/v7/tools/unencrypted-keys-gen/keygen"
)
var (
numKeys = flag.Int("num-keys", 0, "Number of validator private/withdrawal keys to generate")
startIndex = flag.Uint64("start-index", 0, "Start index for the deterministic keygen algorithm")
random = flag.Bool("random", false, "Randomly generate keys")
outputJSON = flag.String("output-json", "", "JSON file to write output to")
overwrite = flag.Bool("overwrite", false, "If the key file exists, it will be overwritten")
)
func main() {
flag.Parse()
if *numKeys == 0 {
log.Fatal("Please specify --num-keys to generate")
}
if *outputJSON == "" {
log.Fatal("Please specify an --output-json file to write the unencrypted keys to")
}
if !*overwrite {
if _, err := os.Stat(*outputJSON); err == nil {
log.Fatal("The file exists. Use a different file name or the --overwrite flag")
}
}
file, err := os.Create(*outputJSON)
if err != nil {
log.Fatal(err)
}
cleanup := func() {
if err := file.Close(); err != nil {
log.Fatal(err)
}
}
defer cleanup()
var ctnr *keygen.UnencryptedKeysContainer
if *random {
ctnr, err = generateRandomKeys(*numKeys)
if err != nil {
// log.Fatal will prevent defer from being called
cleanup()
log.Fatal(err)
}
} else {
ctnr = generateUnencryptedKeys(*startIndex)
}
if err := keygen.SaveUnencryptedKeysToFile(file, ctnr); err != nil {
// log.Fatal will prevent defer from being called
cleanup()
log.Fatal(err)
}
}
func generateRandomKeys(num int) (*keygen.UnencryptedKeysContainer, error) {
ctnr := &keygen.UnencryptedKeysContainer{
Keys: make([]*keygen.UnencryptedKeys, num),
}
for i := range num {
sk, err := bls.RandKey()
if err != nil {
return nil, err
}
ctnr.Keys[i] = &keygen.UnencryptedKeys{
ValidatorKey: sk.Marshal(),
WithdrawalKey: sk.Marshal(),
}
}
return ctnr, nil
}
func generateUnencryptedKeys(startIndex uint64) *keygen.UnencryptedKeysContainer {
ctnr := &keygen.UnencryptedKeysContainer{
Keys: make([]*keygen.UnencryptedKeys, *numKeys),
}
sks, _, err := interop.DeterministicallyGenerateKeys(startIndex, uint64(*numKeys))
if err != nil {
panic(err)
}
for i, sk := range sks {
ctnr.Keys[i] = &keygen.UnencryptedKeys{
ValidatorKey: sk.Marshal(),
WithdrawalKey: sk.Marshal(),
}
}
return ctnr
}