@@ -213,7 +213,6 @@ sudo usermod -aG sudo solana
213
213
cd /home/solana
214
214
sudo mkdir ./bin
215
215
216
- echo " Download and unpack Solana"
217
216
echo " Downloading x86 binaries for version v$SOLANA_VERSION "
218
217
219
218
sudo wget -q https://github.com/solana-labs/solana/releases/download/v$SOLANA_VERSION /solana-release-x86_64-unknown-linux-gnu.tar.bz2
@@ -227,38 +226,39 @@ cd /home/solana/bin
227
226
if [[ $NODE_IDENTITY_SECRET_ARN == " none" ]]; then
228
227
echo " Create node identity"
229
228
sudo ./solana-keygen new --no-passphrase -o /home/solana/config/validator-keypair.json
230
- NODE_IDENTITY=$( sudo ./solana-keygen pubkey /home/solana/config/validator-keypair.json)
231
- echo " Backing up node identity to AWS Secrets Manager"
232
- sudo aws secretsmanager create-secret --name " solana-node/" $NODE_IDENTITY --description " Solana Node Identity Secret created for stack $CF_STACK_NAME " --secret-string file:///home/solana/config/validator-keypair.json --region $AWS_REGION
233
229
else
234
- echo " Retrieving node identity from AWS Secrets Manager"
230
+ echo " Get node identity from AWS Secrets Manager"
235
231
sudo aws secretsmanager get-secret-value --secret-id $NODE_IDENTITY_SECRET_ARN --query SecretString --output text --region $AWS_REGION > ~ /validator-keypair.json
236
232
sudo mv ~ /validator-keypair.json /home/solana/config/validator-keypair.json
237
233
fi
238
-
239
234
if [[ " $SOLANA_NODE_TYPE " == " consensus" ]]; then
235
+ if [[ $NODE_IDENTITY_SECRET_ARN == " none" ]]; then
236
+ echo " Storing generated node identity to AWS Secrets Manager"
237
+ NODE_IDENTITY=$( sudo ./solana-keygen pubkey /home/solana/config/vote-account-keypair.json)
238
+ sudo aws secretsmanager create-secret --name " solana-node/" $NODE_IDENTITY --description " Solana Node Identity Secret created for stack $CF_STACK_NAME " --secret-string file:///home/solana/config/validator-keypair.json --region $AWS_REGION
239
+ fi
240
240
if [[ $VOTE_ACCOUNT_SECRET_ARN == " none" ]]; then
241
241
echo " Create Vote Account Secret"
242
242
sudo ./solana-keygen new --no-passphrase -o /home/solana/config/vote-account-keypair.json
243
243
NODE_IDENTITY=$( sudo ./solana-keygen pubkey /home/solana/config/vote-account-keypair.json)
244
- echo " Backing up Vote Account Secret to AWS Secrets Manager"
244
+ echo " Storing Vote Account Secret to AWS Secrets Manager"
245
245
sudo aws secretsmanager create-secret --name " solana-node/" $NODE_IDENTITY --description " Solana Vote Account Secret created for stack $CF_STACK_NAME " --secret-string file:///home/solana/config/vote-account-keypair.json --region $AWS_REGION
246
246
247
247
if [[ $AUTHORIZED_WITHDRAWER_ACCOUNT_SECRET_ARN == " none" ]]; then
248
248
echo " Create Authorized Withdrawer Account Secret"
249
249
sudo ./solana-keygen new --no-passphrase -o /home/solana/config/authorized-withdrawer-keypair.json
250
250
NODE_IDENTITY=$( sudo ./solana-keygen pubkey /home/solana/config/authorized-withdrawer-keypair.json)
251
- echo " Backing up Authorized Withdrawer Account to AWS Secrets Manager"
251
+ echo " Storing Authorized Withdrawer Account to AWS Secrets Manager"
252
252
sudo aws secretsmanager create-secret --name " solana-node/" $NODE_IDENTITY --description " Authorized Withdrawer Account Secret created for stack $CF_STACK_NAME " --secret-string file:///home/solana/config/authorized-withdrawer-keypair.json --region $AWS_REGION
253
253
254
254
else
255
- echo " Retrieving Authorized Withdrawer Account Secret from AWS Secrets Manager"
255
+ echo " Get Authorized Withdrawer Account Secret from AWS Secrets Manager"
256
256
sudo aws secretsmanager get-secret-value --secret-id $AUTHORIZED_WITHDRAWER_ACCOUNT_SECRET_ARN --query SecretString --output text --region $AWS_REGION > ~ /authorized-withdrawer-keypair.json
257
257
sudo mv ~ /authorized-withdrawer-keypair.json /home/solana/config/authorized-withdrawer-keypair.json
258
258
fi
259
259
260
260
if [[ $REGISTRATION_TRANSACTION_FUNDING_ACCOUNT_SECRET_ARN != " none" ]]; then
261
- echo " Retrieving Registration Transaction Funding Account Secret from AWS Secrets Manager"
261
+ echo " Get Registration Transaction Funding Account Secret from AWS Secrets Manager"
262
262
sudo aws secretsmanager get-secret-value --secret-id $REGISTRATION_TRANSACTION_FUNDING_ACCOUNT_SECRET_ARN --query SecretString --output text --region $AWS_REGION > ~ /id.json
263
263
sudo mkdir -p /root/.config/solana
264
264
sudo mv ~ /id.json /root/.config/solana/id.json
@@ -274,7 +274,7 @@ if [[ "$SOLANA_NODE_TYPE" == "consensus" ]]; then
274
274
echo " Deleting Authorized Withdrawer Account from the local disc"
275
275
sudo rm /home/solana/config/authorized-withdrawer-keypair.json
276
276
else
277
- echo " Retrieving Vote Account Secret from AWS Secrets Manager"
277
+ echo " Get Vote Account Secret from AWS Secrets Manager"
278
278
sudo aws secretsmanager get-secret-value --secret-id $VOTE_ACCOUNT_SECRET_ARN --query SecretString --output text --region $AWS_REGION > ~ /vote-account-keypair.json
279
279
sudo mv ~ /vote-account-keypair.json /home/solana/config/vote-account-keypair.json
280
280
fi
@@ -296,7 +296,6 @@ sed -i "s/__KNOWN_VALIDATORS__/$KNOWN_VALIDATORS/g" /home/solana/bin/validator.s
296
296
sed -i " s/__ENTRY_POINTS__/$ENTRY_POINTS /g" /home/solana/bin/validator.sh
297
297
sudo chmod +x /home/solana/bin/validator.sh
298
298
299
- echo " Making sure the solana user has access to everything needed"
300
299
sudo chown -R solana:solana /var/solana
301
300
sudo chown -R solana:solana /home/solana
302
301
0 commit comments