mirror of
https://github.com/sigp/lighthouse.git
synced 2026-03-15 02:42:38 +00:00
* Clippy account manager * Clippy account_manager * Clippy beacon_node/beacon_chain * Clippy beacon_node/client * Clippy beacon_node/eth1 * Clippy beacon_node/eth2-libp2p * Clippy beacon_node/genesis * Clippy beacon_node/network * Clippy beacon_node/rest_api * Clippy beacon_node/src * Clippy beacon_node/store * Clippy eth2/lmd_ghost * Clippy eth2/operation_pool * Clippy eth2/state_processing * Clippy eth2/types * Clippy eth2/utils/bls * Clippy eth2/utils/cahced_tree_hash * Clippy eth2/utils/deposit_contract * Clippy eth2/utils/eth2_interop_keypairs * Clippy eth2/utils/eth2_testnet_config * Clippy eth2/utils/lighthouse_metrics * Clippy eth2/utils/ssz * Clippy eth2/utils/ssz_types * Clippy eth2/utils/tree_hash_derive * Clippy lcli * Clippy tests/beacon_chain_sim * Clippy validator_client * Cargo fmt
117 lines
3.9 KiB
Rust
117 lines
3.9 KiB
Rust
use crate::deploy_deposit_contract::parse_password;
|
|
use clap::ArgMatches;
|
|
use environment::Environment;
|
|
use eth2_testnet_config::Eth2TestnetConfig;
|
|
use futures::{future, Future};
|
|
use std::path::PathBuf;
|
|
use types::EthSpec;
|
|
use web3::{
|
|
transports::Http,
|
|
types::{Address, TransactionRequest, U256},
|
|
Web3,
|
|
};
|
|
|
|
/// `keccak("steal()")[0..4]`
|
|
pub const STEAL_FN_SIGNATURE: &[u8] = &[0xcf, 0x7a, 0x89, 0x65];
|
|
|
|
pub fn run<T: EthSpec>(mut env: Environment<T>, matches: &ArgMatches) -> Result<(), String> {
|
|
let endpoint = matches
|
|
.value_of("eth1-endpoint")
|
|
.ok_or_else(|| "eth1-endpoint not specified")?;
|
|
|
|
let account_index = matches
|
|
.value_of("account-index")
|
|
.ok_or_else(|| "No account-index".to_string())?
|
|
.parse::<usize>()
|
|
.map_err(|e| format!("Unable to parse account-index: {}", e))?;
|
|
|
|
let password_opt = parse_password(matches)?;
|
|
|
|
let testnet_dir = matches
|
|
.value_of("testnet-dir")
|
|
.ok_or_else(|| ())
|
|
.and_then(|dir| dir.parse::<PathBuf>().map_err(|_| ()))
|
|
.unwrap_or_else(|_| {
|
|
dirs::home_dir()
|
|
.map(|home| home.join(".lighthouse").join("testnet"))
|
|
.expect("should locate home directory")
|
|
});
|
|
|
|
let eth2_testnet_config: Eth2TestnetConfig<T> = Eth2TestnetConfig::load(testnet_dir)?;
|
|
|
|
let (_event_loop, transport) = Http::new(&endpoint).map_err(|e| {
|
|
format!(
|
|
"Failed to start HTTP transport connected to ganache: {:?}",
|
|
e
|
|
)
|
|
})?;
|
|
|
|
let web3_1 = Web3::new(transport);
|
|
let web3_2 = web3_1.clone();
|
|
|
|
// Convert from `types::Address` to `web3::types::Address`.
|
|
let deposit_contract = Address::from_slice(
|
|
eth2_testnet_config
|
|
.deposit_contract_address()?
|
|
.as_fixed_bytes(),
|
|
);
|
|
|
|
let future = web3_1
|
|
.eth()
|
|
.accounts()
|
|
.map_err(|e| format!("Failed to get accounts: {:?}", e))
|
|
.and_then(move |accounts| {
|
|
accounts
|
|
.get(account_index)
|
|
.cloned()
|
|
.ok_or_else(|| "Insufficient accounts for deposit".to_string())
|
|
})
|
|
.and_then(move |from_address| {
|
|
let future: Box<dyn Future<Item = Address, Error = String> + Send> =
|
|
if let Some(password) = password_opt {
|
|
// Unlock for only a single transaction.
|
|
let duration = None;
|
|
|
|
let future = web3_1
|
|
.personal()
|
|
.unlock_account(from_address, &password, duration)
|
|
.then(move |result| match result {
|
|
Ok(true) => Ok(from_address),
|
|
Ok(false) => Err("Eth1 node refused to unlock account".to_string()),
|
|
Err(e) => Err(format!("Eth1 unlock request failed: {:?}", e)),
|
|
});
|
|
|
|
Box::new(future)
|
|
} else {
|
|
Box::new(future::ok(from_address))
|
|
};
|
|
|
|
future
|
|
})
|
|
.and_then(move |from| {
|
|
let tx_request = TransactionRequest {
|
|
from,
|
|
to: Some(deposit_contract),
|
|
gas: Some(U256::from(400_000)),
|
|
gas_price: None,
|
|
value: Some(U256::zero()),
|
|
data: Some(STEAL_FN_SIGNATURE.into()),
|
|
nonce: None,
|
|
condition: None,
|
|
};
|
|
|
|
web3_2
|
|
.eth()
|
|
.send_transaction(tx_request)
|
|
.map_err(|e| format!("Failed to call deposit fn: {:?}", e))
|
|
})
|
|
.map(move |tx| info!("Refund transaction submitted: eth1_tx_hash: {:?}", tx))
|
|
.map_err(move |e| error!("Unable to submit refund transaction: error: {}", e));
|
|
|
|
env.runtime()
|
|
.block_on(future)
|
|
.map_err(|()| "Failed to send transaction".to_string())?;
|
|
|
|
Ok(())
|
|
}
|