@@ -12,7 +12,7 @@ import (
12
12
"time"
13
13
14
14
tm "github.com/buger/goterm"
15
- "github.com/certusone/wormhole/node/pkg/common"
15
+ node_common "github.com/certusone/wormhole/node/pkg/common"
16
16
"github.com/certusone/wormhole/node/pkg/p2p"
17
17
gossipv1 "github.com/certusone/wormhole/node/pkg/proto/gossip/v1"
18
18
"github.com/certusone/wormhole/node/pkg/supervisor"
@@ -22,6 +22,7 @@ import (
22
22
"github.com/libp2p/go-libp2p/core/crypto"
23
23
"github.com/prometheus/client_golang/prometheus"
24
24
dto "github.com/prometheus/client_model/go"
25
+ "github.com/wormhole-foundation/wormhole-monitor/fly/common"
25
26
"github.com/wormhole-foundation/wormhole-monitor/fly/utils"
26
27
"github.com/wormhole-foundation/wormhole/sdk"
27
28
"github.com/wormhole-foundation/wormhole/sdk/vaa"
@@ -86,61 +87,6 @@ var currentObsvData map[uint]uint
86
87
var currentObsvTable map [uint ]uint
87
88
var obsvRateRows []obsvRateRow
88
89
89
- type guardianEntry struct {
90
- index int
91
- name string
92
- address string
93
- }
94
-
95
- var mainnetGuardians = []guardianEntry {
96
- {0 , "RockawayX" , "0x5893B5A76c3f739645648885bDCcC06cd70a3Cd3" },
97
- {1 , "Staked" , "0xfF6CB952589BDE862c25Ef4392132fb9D4A42157" },
98
- {2 , "Figment" , "0x114De8460193bdf3A2fCf81f86a09765F4762fD1" },
99
- {3 , "ChainodeTech" , "0x107A0086b32d7A0977926A205131d8731D39cbEB" },
100
- {4 , "Inotel" , "0x8C82B2fd82FaeD2711d59AF0F2499D16e726f6b2" },
101
- {5 , "HashKey Cloud" , "0x11b39756C042441BE6D8650b69b54EbE715E2343" },
102
- {6 , "ChainLayer" , "0x54Ce5B4D348fb74B958e8966e2ec3dBd4958a7cd" },
103
- {7 , "xLabs" , "0x15e7cAF07C4e3DC8e7C469f92C8Cd88FB8005a20" },
104
- {8 , "Forbole" , "0x74a3bf913953D695260D88BC1aA25A4eeE363ef0" },
105
- {9 , "Staking Fund" , "0x000aC0076727b35FBea2dAc28fEE5cCB0fEA768e" },
106
- {10 , "Moonlet" , "0xAF45Ced136b9D9e24903464AE889F5C8a723FC14" },
107
- {11 , "P2P Validator" , "0xf93124b7c738843CBB89E864c862c38cddCccF95" },
108
- {12 , "01node" , "0xD2CC37A4dc036a8D232b48f62cDD4731412f4890" },
109
- {13 , "MCF" , "0xDA798F6896A3331F64b48c12D1D57Fd9cbe70811" },
110
- {14 , "Everstake" , "0x71AA1BE1D36CaFE3867910F99C09e347899C19C3" },
111
- {15 , "Chorus One" , "0x8192b6E7387CCd768277c17DAb1b7a5027c0b3Cf" },
112
- {16 , "syncnode" , "0x178e21ad2E77AE06711549CFBB1f9c7a9d8096e8" },
113
- {17 , "Triton" , "0x5E1487F35515d02A92753504a8D75471b9f49EdB" },
114
- {18 , "Staking Facilities" , "0x6FbEBc898F403E4773E95feB15E80C9A99c8348d" },
115
- }
116
-
117
- // Although there are multiple testnet guardians running, they all use the same key, so it looks like one.
118
- var testnetGuardians = []guardianEntry {
119
- {0 , "Testnet" , "0x13947Bd48b18E53fdAeEe77F3473391aC727C638" },
120
- }
121
-
122
- var devnetGuardians = []guardianEntry {
123
- {0 , "guardian-0" , "0xbeFA429d57cD18b7F8A4d91A2da9AB4AF05d0FBe" },
124
- {1 , "guardian-1" , "0x88D7D8B32a9105d228100E72dFFe2Fae0705D31c" },
125
- {2 , "guardian-2" , "0x58076F561CC62A47087B567C86f986426dFCD000" },
126
- {3 , "guardian-3" , "0xBd6e9833490F8fA87c733A183CD076a6cBD29074" },
127
- {4 , "guardian-4" , "0xb853FCF0a5C78C1b56D15fCE7a154e6ebe9ED7a2" },
128
- {5 , "guardian-5" , "0xAF3503dBD2E37518ab04D7CE78b630F98b15b78a" },
129
- {6 , "guardian-6" , "0x785632deA5609064803B1c8EA8bB2c77a6004Bd1" },
130
- {7 , "guardian-7" , "0x09a281a698C0F5BA31f158585B41F4f33659e54D" },
131
- {8 , "guardian-8" , "0x3178443AB76a60E21690DBfB17f7F59F09Ae3Ea1" },
132
- {9 , "guardian-9" , "0x647ec26ae49b14060660504f4DA1c2059E1C5Ab6" },
133
- {10 , "guardian-10" , "0x810AC3D8E1258Bd2F004a94Ca0cd4c68Fc1C0611" },
134
- {11 , "guardian-11" , "0x80610e96d645b12f47ae5cf4546b18538739e90F" },
135
- {12 , "guardian-12" , "0x2edb0D8530E31A218E72B9480202AcBaeB06178d" },
136
- {13 , "guardian-13" , "0xa78858e5e5c4705CdD4B668FFe3Be5bae4867c9D" },
137
- {14 , "guardian-14" , "0x5Efe3A05Efc62D60e1D19fAeB56A80223CDd3472" },
138
- {15 , "guardian-15" , "0xD791b7D32C05aBB1cc00b6381FA0c4928f0c56fC" },
139
- {16 , "guardian-16" , "0x14Bc029B8809069093D712A3fd4DfAb31963597e" },
140
- {17 , "guardian-17" , "0x246Ab29FC6EBeDf2D392a51ab2Dc5C59d0902A03" },
141
- {18 , "guardian-18" , "0x132A84dFD920b35a3D0BA5f7A0635dF298F9033e" },
142
- }
143
-
144
90
func main () {
145
91
flag .Parse ()
146
92
@@ -158,37 +104,37 @@ func main() {
158
104
logger .Fatal ("--env is required" )
159
105
}
160
106
161
- env , err := common .ParseEnvironment (* envStr )
162
- if err != nil || (env != common .UnsafeDevNet && env != common .TestNet && env != common .MainNet ) {
107
+ env , err := node_common .ParseEnvironment (* envStr )
108
+ if err != nil || (env != node_common .UnsafeDevNet && env != node_common .TestNet && env != node_common .MainNet ) {
163
109
if * envStr == "" {
164
110
logger .Fatal ("Please specify --env" )
165
111
}
166
112
logger .Fatal ("Invalid value for --env, should be devnet, testnet or mainnet" , zap .String ("val" , * envStr ))
167
113
}
168
114
169
115
// Build the set of guardians based on our environment, where the default is mainnet.
170
- var guardians []guardianEntry
116
+ var guardians []common. GuardianEntry
171
117
var knownEmitter []sdk.EmitterInfo
172
- if env == common .MainNet {
173
- guardians = mainnetGuardians
118
+ if env == node_common .MainNet {
119
+ guardians = common . MainnetGuardians
174
120
knownEmitter = sdk .KnownEmitters
175
121
rpcUrl = "https://rpc.ankr.com/eth"
176
122
coreBridgeAddr = "0x98f3c9e6E3fAce36bAAd05FE09d375Ef1464288B"
177
- } else if env == common .TestNet {
178
- guardians = testnetGuardians
123
+ } else if env == node_common .TestNet {
124
+ guardians = common . TestnetGuardians
179
125
knownEmitter = sdk .KnownTestnetEmitters
180
126
rpcUrl = "https://rpc.ankr.com/eth_holesky"
181
127
coreBridgeAddr = "0xa10f2eF61dE1f19f586ab8B6F2EbA89bACE63F7a"
182
- } else if env == common .UnsafeDevNet {
183
- guardians = devnetGuardians
128
+ } else if env == node_common .UnsafeDevNet {
129
+ guardians = common . DevnetGuardians
184
130
knownEmitter = sdk .KnownDevnetEmitters
185
131
rpcUrl = "http://localhost:8545"
186
132
coreBridgeAddr = "0xC89Ce4735882C9F0f0FE26686c53074E09B0D550"
187
133
}
188
134
189
135
for _ , gse := range guardians {
190
- guardianIndexToNameMap [gse .index ] = gse .name
191
- guardianIndexMap [strings .ToLower (gse .address )] = gse .index
136
+ guardianIndexToNameMap [gse .Index ] = gse .Name
137
+ guardianIndexMap [strings .ToLower (gse .Address )] = gse .Index
192
138
}
193
139
194
140
// Fill in the known emitters
@@ -251,7 +197,7 @@ func main() {
251
197
sendC := make (chan []byte )
252
198
253
199
// Inbound observations
254
- obsvC := make (chan * common .MsgWithTimeStamp [gossipv1.SignedObservation ], 20000 )
200
+ obsvC := make (chan * node_common .MsgWithTimeStamp [gossipv1.SignedObservation ], 20000 )
255
201
256
202
// Inbound observation requests
257
203
obsvReqC := make (chan * gossipv1.ObservationRequest , 20000 )
@@ -263,7 +209,7 @@ func main() {
263
209
heartbeatC := make (chan * gossipv1.Heartbeat , 20000 )
264
210
265
211
// Guardian set state managed by processor
266
- gst := common .NewGuardianSetState (heartbeatC )
212
+ gst := node_common .NewGuardianSetState (heartbeatC )
267
213
268
214
// Governor cfg
269
215
govConfigC := make (chan * gossipv1.SignedChainGovernorConfig , 20000 )
@@ -276,7 +222,7 @@ func main() {
276
222
logger .Fatal ("Failed to fetch guardian set" , zap .Error (err ))
277
223
}
278
224
logger .Info ("guardian set" , zap .Uint32 ("index" , idx ), zap .Any ("gs" , sgs ))
279
- gs := common .GuardianSet {
225
+ gs := node_common .GuardianSet {
280
226
Keys : sgs .Keys ,
281
227
Index : idx ,
282
228
}
@@ -608,7 +554,7 @@ func main() {
608
554
609
555
// Load p2p private key
610
556
var priv crypto.PrivKey
611
- priv , err = common .GetOrCreateNodeKey (logger , * nodeKeyPath )
557
+ priv , err = node_common .GetOrCreateNodeKey (logger , * nodeKeyPath )
612
558
if err != nil {
613
559
logger .Fatal ("Failed to load node key" , zap .Error (err ))
614
560
}
0 commit comments