-
Notifications
You must be signed in to change notification settings - Fork 38
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[pectra] Eigenpod CLI updates #174
Conversation
if withdrawalCredentials[0] != 1 { | ||
// after the pectra upgrade, eigenpods may be found at: | ||
// - `0x1` or `0x2` prefixed withdrawal addresses | ||
if withdrawalCredentials[0] != 1 && withdrawalCredentials[0] != 2 { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
support for 0x2 credentials
if !v.Validator.Slashed { | ||
return false // we only care about slashed validators. | ||
} | ||
if v.Validator.WithdrawalCredentials[0] != 1 { | ||
if v.Validator.WithdrawalCredentials[0] != 1 && v.Validator.WithdrawalCredentials[0] != 2 { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
support for 0x2 credentials
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
a function for this would be nice for future changes but nbd
@@ -274,7 +291,7 @@ func FindAllValidatorsForEigenpod(eigenpodAddress string, beaconState *spec.Vers | |||
maxValidators := uint64(len(allValidators)) | |||
for i = 0; i < maxValidators; i++ { | |||
validator := allValidators[i] | |||
if validator == nil || validator.WithdrawalCredentials[0] != 1 { // withdrawalCredentials _need_ their first byte set to 1 to withdraw to execution layer. | |||
if validator == nil || (validator.WithdrawalCredentials[0] != 1 && validator.WithdrawalCredentials[0] != 2) { // withdrawalCredentials _need_ their first byte set to 1 or 2 to withdraw to an eigenpod on the execution layer. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ditto 0x2 credentials
Just validated that all the places we check for 0x01, we also check 0x02 |
CI passes here, old version was pinned on a commit ( |
Changelog:
Major:
WithdrawalCredentials
can now be prefixed with0x1
or0x2
for eigenpods.github.com/attestantio/go-eth2-client
to latestRoutine/Cleanup:
lo
utility libraryAfter merging this, we will;