mirror of
https://github.com/OffchainLabs/prysm.git
synced 2026-01-08 07:03:58 -05:00
* Ran gopls modernize to fix everything go run golang.org/x/tools/gopls/internal/analysis/modernize/cmd/modernize@latest -fix -test ./... * Override rules_go provided dependency for golang.org/x/tools to v0.38.0. To update this, checked out rules_go, then ran `bazel run //go/tools/releaser -- upgrade-dep -mirror=false org_golang_x_tools` and copied the patches. * Fix buildtag violations and ignore buildtag violations in external * Introduce modernize analyzer package. * Add modernize "any" analyzer. * Fix violations of any analyzer * Add modernize "appendclipped" analyzer. * Fix violations of appendclipped * Add modernize "bloop" analyzer. * Add modernize "fmtappendf" analyzer. * Add modernize "forvar" analyzer. * Add modernize "mapsloop" analyzer. * Add modernize "minmax" analyzer. * Fix violations of minmax analyzer * Add modernize "omitzero" analyzer. * Add modernize "rangeint" analyzer. * Fix violations of rangeint. * Add modernize "reflecttypefor" analyzer. * Fix violations of reflecttypefor analyzer. * Add modernize "slicescontains" analyzer. * Add modernize "slicessort" analyzer. * Add modernize "slicesdelete" analyzer. This is disabled by default for now. See https://go.dev/issue/73686. * Add modernize "stringscutprefix" analyzer. * Add modernize "stringsbuilder" analyzer. * Fix violations of stringsbuilder analyzer. * Add modernize "stringsseq" analyzer. * Add modernize "testingcontext" analyzer. * Add modernize "waitgroup" analyzer. * Changelog fragment * gofmt * gazelle * Add modernize "newexpr" analyzer. * Disable newexpr until go1.26 * Add more details in WORKSPACE on how to update the override * @nalepae feedback on min() * gofmt * Fix violations of forvar
103 lines
2.4 KiB
Go
103 lines
2.4 KiB
Go
package main
|
|
|
|
import (
|
|
"flag"
|
|
"log"
|
|
"os"
|
|
|
|
"github.com/OffchainLabs/prysm/v7/crypto/bls"
|
|
"github.com/OffchainLabs/prysm/v7/runtime/interop"
|
|
"github.com/OffchainLabs/prysm/v7/tools/unencrypted-keys-gen/keygen"
|
|
)
|
|
|
|
var (
|
|
numKeys = flag.Int("num-keys", 0, "Number of validator private/withdrawal keys to generate")
|
|
startIndex = flag.Uint64("start-index", 0, "Start index for the deterministic keygen algorithm")
|
|
random = flag.Bool("random", false, "Randomly generate keys")
|
|
outputJSON = flag.String("output-json", "", "JSON file to write output to")
|
|
overwrite = flag.Bool("overwrite", false, "If the key file exists, it will be overwritten")
|
|
)
|
|
|
|
func main() {
|
|
flag.Parse()
|
|
if *numKeys == 0 {
|
|
log.Fatal("Please specify --num-keys to generate")
|
|
}
|
|
if *outputJSON == "" {
|
|
log.Fatal("Please specify an --output-json file to write the unencrypted keys to")
|
|
}
|
|
|
|
if !*overwrite {
|
|
if _, err := os.Stat(*outputJSON); err == nil {
|
|
log.Fatal("The file exists. Use a different file name or the --overwrite flag")
|
|
}
|
|
}
|
|
|
|
file, err := os.Create(*outputJSON)
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
cleanup := func() {
|
|
if err := file.Close(); err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
}
|
|
defer cleanup()
|
|
|
|
var ctnr *keygen.UnencryptedKeysContainer
|
|
if *random {
|
|
ctnr, err = generateRandomKeys(*numKeys)
|
|
if err != nil {
|
|
// log.Fatal will prevent defer from being called
|
|
cleanup()
|
|
log.Fatal(err)
|
|
}
|
|
} else {
|
|
ctnr = generateUnencryptedKeys(*startIndex)
|
|
}
|
|
if err := keygen.SaveUnencryptedKeysToFile(file, ctnr); err != nil {
|
|
// log.Fatal will prevent defer from being called
|
|
cleanup()
|
|
log.Fatal(err)
|
|
}
|
|
}
|
|
|
|
func generateRandomKeys(num int) (*keygen.UnencryptedKeysContainer, error) {
|
|
ctnr := &keygen.UnencryptedKeysContainer{
|
|
Keys: make([]*keygen.UnencryptedKeys, num),
|
|
}
|
|
|
|
for i := range num {
|
|
sk, err := bls.RandKey()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
ctnr.Keys[i] = &keygen.UnencryptedKeys{
|
|
ValidatorKey: sk.Marshal(),
|
|
WithdrawalKey: sk.Marshal(),
|
|
}
|
|
}
|
|
|
|
return ctnr, nil
|
|
}
|
|
|
|
func generateUnencryptedKeys(startIndex uint64) *keygen.UnencryptedKeysContainer {
|
|
ctnr := &keygen.UnencryptedKeysContainer{
|
|
Keys: make([]*keygen.UnencryptedKeys, *numKeys),
|
|
}
|
|
|
|
sks, _, err := interop.DeterministicallyGenerateKeys(startIndex, uint64(*numKeys))
|
|
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
|
|
for i, sk := range sks {
|
|
ctnr.Keys[i] = &keygen.UnencryptedKeys{
|
|
ValidatorKey: sk.Marshal(),
|
|
WithdrawalKey: sk.Marshal(),
|
|
}
|
|
}
|
|
return ctnr
|
|
}
|