2023-12-01 16:20:52 +00:00
|
|
|
# Fluffy
|
2024-01-25 10:04:09 +00:00
|
|
|
# Copyright (c) 2021-2024 Status Research & Development GmbH
|
2021-06-16 19:18:45 +00:00
|
|
|
# Licensed and distributed under either of
|
|
|
|
# * MIT license (license terms in the root directory or at https://opensource.org/licenses/MIT).
|
|
|
|
# * Apache v2 license (license terms in the root directory or at https://www.apache.org/licenses/LICENSE-2.0).
|
|
|
|
# at your option. This file may not be copied, modified, or distributed except according to those terms.
|
|
|
|
|
2023-01-31 12:38:08 +00:00
|
|
|
{.push raises: [].}
|
2021-06-16 19:18:45 +00:00
|
|
|
|
|
|
|
import
|
2024-06-20 02:48:45 +00:00
|
|
|
std/[os, enumutils],
|
2024-02-28 17:31:45 +00:00
|
|
|
confutils,
|
|
|
|
confutils/std/net,
|
|
|
|
chronicles,
|
|
|
|
chronicles/topics_registry,
|
|
|
|
chronos,
|
|
|
|
metrics,
|
|
|
|
metrics/chronos_httpserver,
|
|
|
|
json_rpc/clients/httpclient,
|
|
|
|
json_rpc/rpcproxy,
|
2024-05-30 12:54:03 +00:00
|
|
|
results,
|
|
|
|
stew/[byteutils, io2],
|
2024-02-28 17:31:45 +00:00
|
|
|
eth/keys,
|
|
|
|
eth/net/nat,
|
2021-06-16 19:18:45 +00:00
|
|
|
eth/p2p/discoveryv5/protocol as discv5_protocol,
|
2024-02-28 17:31:45 +00:00
|
|
|
./conf,
|
|
|
|
./network_metadata,
|
|
|
|
./common/common_utils,
|
|
|
|
./rpc/
|
|
|
|
[rpc_web3_api, rpc_eth_api, rpc_discovery_api, rpc_portal_api, rpc_portal_debug_api],
|
2023-12-01 16:20:52 +00:00
|
|
|
./database/content_db,
|
2024-07-09 17:22:25 +00:00
|
|
|
./portal_node,
|
2024-02-28 17:31:45 +00:00
|
|
|
./version,
|
|
|
|
./logging
|
2023-04-19 15:01:01 +00:00
|
|
|
|
2024-02-28 17:31:45 +00:00
|
|
|
chronicles.formatIt(IoErrorCode):
|
|
|
|
$it
|
2021-07-02 05:30:48 +00:00
|
|
|
|
2024-07-09 17:22:25 +00:00
|
|
|
func optionToOpt[T](o: Option[T]): Opt[T] =
|
|
|
|
if o.isSome():
|
|
|
|
Opt.some(o.unsafeGet())
|
2024-06-20 02:48:45 +00:00
|
|
|
else:
|
2024-07-09 17:22:25 +00:00
|
|
|
Opt.none(T)
|
2024-06-20 02:48:45 +00:00
|
|
|
|
2023-03-13 20:30:57 +00:00
|
|
|
proc run(config: PortalConf) {.raises: [CatchableError].} =
|
2024-07-15 09:41:17 +00:00
|
|
|
setupLogging(config.logLevel, config.logStdout, none(OutFile))
|
2023-04-19 15:01:01 +00:00
|
|
|
|
2024-02-28 17:31:45 +00:00
|
|
|
notice "Launching Fluffy", version = fullVersionStr, cmdParams = commandLineParams()
|
2023-04-19 15:01:01 +00:00
|
|
|
|
2024-07-09 17:22:25 +00:00
|
|
|
let rng = newRng()
|
|
|
|
|
2022-03-18 12:06:57 +00:00
|
|
|
# Make sure dataDir exists
|
|
|
|
let pathExists = createPath(config.dataDir.string)
|
|
|
|
if pathExists.isErr():
|
2024-02-28 17:31:45 +00:00
|
|
|
fatal "Failed to create data directory",
|
|
|
|
dataDir = config.dataDir, error = pathExists.error
|
2022-03-18 12:06:57 +00:00
|
|
|
quit 1
|
|
|
|
|
2024-07-09 17:22:25 +00:00
|
|
|
## Network configuration
|
2021-06-16 19:18:45 +00:00
|
|
|
let
|
|
|
|
bindIp = config.listenAddress
|
|
|
|
udpPort = Port(config.udpPort)
|
|
|
|
# TODO: allow for no TCP port mapping!
|
|
|
|
(extIp, _, extUdpPort) =
|
2024-02-28 17:31:45 +00:00
|
|
|
try:
|
|
|
|
setupAddress(config.nat, config.listenAddress, udpPort, udpPort, "fluffy")
|
|
|
|
except CatchableError as exc:
|
|
|
|
raise exc # TODO: Ideally we don't have the Exception here
|
|
|
|
except Exception as exc:
|
|
|
|
raiseAssert exc.msg
|
2023-09-25 19:08:10 +00:00
|
|
|
(netkey, newNetKey) =
|
2022-02-17 13:13:39 +00:00
|
|
|
if config.networkKey.isSome():
|
2023-09-25 19:08:10 +00:00
|
|
|
(config.networkKey.get(), true)
|
2022-02-17 13:13:39 +00:00
|
|
|
else:
|
2023-09-25 19:08:10 +00:00
|
|
|
getPersistentNetKey(rng[], config.networkKeyFile)
|
|
|
|
|
|
|
|
enrFilePath = config.dataDir / "fluffy_node.enr"
|
|
|
|
previousEnr =
|
|
|
|
if not newNetKey:
|
|
|
|
getPersistentEnr(enrFilePath)
|
|
|
|
else:
|
|
|
|
Opt.none(enr.Record)
|
2021-06-16 19:18:45 +00:00
|
|
|
|
2021-11-24 11:12:25 +00:00
|
|
|
var bootstrapRecords: seq[Record]
|
|
|
|
loadBootstrapFile(string config.bootstrapNodesFile, bootstrapRecords)
|
|
|
|
bootstrapRecords.add(config.bootstrapNodes)
|
|
|
|
|
2024-06-18 07:32:57 +00:00
|
|
|
let portalNetwork =
|
|
|
|
if config.portalNetworkDeprecated.isNone():
|
|
|
|
config.network
|
|
|
|
else:
|
|
|
|
warn "DEPRECATED: The --portal-network flag will be removed in the future, " &
|
|
|
|
"please use the drop in replacement --network flag instead"
|
|
|
|
config.portalNetworkDeprecated.get()
|
|
|
|
|
|
|
|
let portalSubnetworks =
|
|
|
|
if config.networksDeprecated == {}:
|
|
|
|
config.portalSubnetworks
|
|
|
|
else:
|
|
|
|
warn "DEPRECATED: The --networks flag will be removed in the future, " &
|
|
|
|
"please use the drop in replacement --portal-subnetworks flag instead"
|
|
|
|
config.networksDeprecated
|
2024-03-05 12:45:48 +00:00
|
|
|
|
|
|
|
case portalNetwork
|
2024-06-18 07:32:57 +00:00
|
|
|
of PortalNetwork.none:
|
|
|
|
discard # don't connect to any network bootstrap nodes
|
|
|
|
of PortalNetwork.mainnet:
|
2024-05-22 15:10:31 +00:00
|
|
|
for enrURI in mainnetBootstrapNodes:
|
2024-06-27 15:59:08 +00:00
|
|
|
let res = enr.Record.fromURI(enrURI)
|
|
|
|
if res.isOk():
|
|
|
|
bootstrapRecords.add(res.value)
|
2024-06-18 07:32:57 +00:00
|
|
|
of PortalNetwork.angelfood:
|
|
|
|
for enrURI in angelfoodBootstrapNodes:
|
2024-06-27 15:59:08 +00:00
|
|
|
let res = enr.Record.fromURI(enrURI)
|
|
|
|
if res.isOk():
|
|
|
|
bootstrapRecords.add(res.value)
|
2022-03-17 17:39:24 +00:00
|
|
|
|
2024-07-09 17:22:25 +00:00
|
|
|
## Discovery v5 protocol setup
|
2022-02-02 21:48:33 +00:00
|
|
|
let
|
2024-02-28 17:31:45 +00:00
|
|
|
discoveryConfig =
|
|
|
|
DiscoveryConfig.init(config.tableIpLimit, config.bucketIpLimit, config.bitsPerHop)
|
2022-02-02 21:48:33 +00:00
|
|
|
d = newProtocol(
|
2022-02-17 13:13:39 +00:00
|
|
|
netkey,
|
2024-02-28 17:31:45 +00:00
|
|
|
extIp,
|
2024-06-19 01:57:45 +00:00
|
|
|
Opt.none(Port),
|
2024-02-28 17:31:45 +00:00
|
|
|
extUdpPort,
|
2023-09-20 10:19:40 +00:00
|
|
|
# Note: The addition of default clientInfo to the ENR is a temporary
|
|
|
|
# measure to easily identify & debug the clients used in the testnet.
|
|
|
|
# Might make this into a, default off, cli option.
|
|
|
|
localEnrFields = {"c": enrClientInfoShort},
|
2022-02-02 21:48:33 +00:00
|
|
|
bootstrapRecords = bootstrapRecords,
|
2024-07-09 17:22:25 +00:00
|
|
|
previousRecord = previousEnr,
|
2024-02-28 17:31:45 +00:00
|
|
|
bindIp = bindIp,
|
|
|
|
bindPort = udpPort,
|
2022-02-02 21:48:33 +00:00
|
|
|
enrAutoUpdate = config.enrAutoUpdate,
|
|
|
|
config = discoveryConfig,
|
2024-02-28 17:31:45 +00:00
|
|
|
rng = rng,
|
|
|
|
)
|
2021-06-16 19:18:45 +00:00
|
|
|
|
|
|
|
d.open()
|
|
|
|
|
2024-07-09 17:22:25 +00:00
|
|
|
## Force pruning - optional
|
2023-11-23 10:44:57 +00:00
|
|
|
if config.forcePrune:
|
2024-02-28 17:31:45 +00:00
|
|
|
let db = ContentDB.new(
|
2024-06-20 02:48:45 +00:00
|
|
|
config.dataDir / portalNetwork.getDbDirectory() / "contentdb_" &
|
2024-02-28 17:31:45 +00:00
|
|
|
d.localNode.id.toBytesBE().toOpenArray(0, 8).toHex(),
|
2023-11-21 15:16:15 +00:00
|
|
|
storageCapacity = config.storageCapacityMB * 1_000_000,
|
2024-02-28 17:31:45 +00:00
|
|
|
manualCheckpoint = true,
|
|
|
|
)
|
2023-11-23 10:44:57 +00:00
|
|
|
|
|
|
|
let radius =
|
|
|
|
if config.radiusConfig.kind == Static:
|
|
|
|
UInt256.fromLogRadius(config.radiusConfig.logRadius)
|
|
|
|
else:
|
|
|
|
let oldRadiusApproximation = db.getLargestDistance(d.localNode.id)
|
|
|
|
db.estimateNewRadius(oldRadiusApproximation)
|
|
|
|
|
|
|
|
# Note: In the case of dynamical radius this is all an approximation that
|
|
|
|
# heavily relies on uniformly distributed content and thus will always
|
|
|
|
# have an error margin, either down or up of the requested capacity.
|
|
|
|
# TODO I: Perhaps we want to add an offset to counter the latter.
|
|
|
|
# TODO II: Perhaps for dynamical radius, we want to also apply the vacuum
|
|
|
|
# without the forcePrune flag and purely by checking the amount of free
|
2024-04-02 18:50:05 +00:00
|
|
|
# space versus the pruning fraction. The problem with this is that the
|
|
|
|
# vacuum will temporarily double the space usage (WAL + DB) and thus to do
|
|
|
|
# this automatically without user requesting it could be dangerous.
|
2023-11-23 10:44:57 +00:00
|
|
|
# TODO III: Adding Radius metadata to the db could be yet another way to
|
|
|
|
# decide whether or not to force prune, instead of this flag.
|
|
|
|
db.forcePrune(d.localNode.id, radius)
|
2023-11-21 15:16:15 +00:00
|
|
|
db.close()
|
|
|
|
|
2024-07-09 17:22:25 +00:00
|
|
|
## Portal node setup
|
2022-01-14 15:07:14 +00:00
|
|
|
let
|
2024-07-09 17:22:25 +00:00
|
|
|
portalProtocolConfig = PortalProtocolConfig.init(
|
2024-02-28 17:31:45 +00:00
|
|
|
config.tableIpLimit, config.bucketIpLimit, config.bitsPerHop, config.radiusConfig,
|
|
|
|
config.disablePoke,
|
2022-05-12 16:04:37 +00:00
|
|
|
)
|
2024-07-09 17:22:25 +00:00
|
|
|
|
|
|
|
portalNodeConfig = PortalNodeConfig(
|
|
|
|
accumulatorFile: config.accumulatorFile.optionToOpt().map(
|
|
|
|
proc(v: InputFile): string =
|
|
|
|
$v
|
|
|
|
),
|
|
|
|
disableStateRootValidation: config.disableStateRootValidation,
|
|
|
|
trustedBlockRoot: config.trustedBlockRoot.optionToOpt(),
|
|
|
|
portalConfig: portalProtocolConfig,
|
|
|
|
dataDir: string config.dataDir,
|
|
|
|
storageCapacity: config.storageCapacityMB * 1_000_000,
|
|
|
|
)
|
|
|
|
|
|
|
|
node = PortalNode.new(
|
|
|
|
portalNetwork,
|
|
|
|
portalNodeConfig,
|
|
|
|
d,
|
|
|
|
portalSubnetworks,
|
|
|
|
bootstrapRecords = bootstrapRecords,
|
|
|
|
rng = rng,
|
|
|
|
)
|
2022-02-11 13:43:10 +00:00
|
|
|
|
2021-11-24 11:12:25 +00:00
|
|
|
# TODO: If no new network key is generated then we should first check if an
|
|
|
|
# enr file exists, and in the case it does read out the seqNum from it and
|
|
|
|
# reuse that.
|
|
|
|
let enrFile = config.dataDir / "fluffy_node.enr"
|
|
|
|
if io2.writeFile(enrFile, d.localNode.record.toURI()).isErr:
|
|
|
|
fatal "Failed to write the enr file", file = enrFile
|
|
|
|
quit 1
|
2021-06-16 19:18:45 +00:00
|
|
|
|
2023-03-17 09:19:17 +00:00
|
|
|
## Start metrics HTTP server
|
2021-06-16 19:18:45 +00:00
|
|
|
if config.metricsEnabled:
|
|
|
|
let
|
|
|
|
address = config.metricsAddress
|
|
|
|
port = config.metricsPort
|
|
|
|
url = "http://" & $address & ":" & $port & "/metrics"
|
2024-06-25 10:06:39 +00:00
|
|
|
|
|
|
|
server = MetricsHttpServerRef.new($address, port).valueOr:
|
|
|
|
error "Could not instantiate metrics HTTP server", url, error
|
|
|
|
quit QuitFailure
|
|
|
|
|
|
|
|
info "Starting metrics HTTP server", url
|
2021-06-16 19:18:45 +00:00
|
|
|
try:
|
2024-06-25 10:06:39 +00:00
|
|
|
waitFor server.start()
|
|
|
|
except MetricsError as exc:
|
|
|
|
fatal "Could not start metrics HTTP server",
|
|
|
|
url, error_msg = exc.msg, error_name = exc.name
|
|
|
|
quit QuitFailure
|
2021-06-16 19:18:45 +00:00
|
|
|
|
2024-07-09 17:22:25 +00:00
|
|
|
## Start discovery v5 protocol and the Portal node.
|
2023-03-17 09:19:17 +00:00
|
|
|
d.start()
|
2024-07-09 17:22:25 +00:00
|
|
|
node.start()
|
|
|
|
|
|
|
|
## Start the JSON-RPC APIs
|
2021-06-18 17:20:48 +00:00
|
|
|
if config.rpcEnabled:
|
2021-07-07 12:13:27 +00:00
|
|
|
let ta = initTAddress(config.rpcAddress, config.rpcPort)
|
2024-03-15 09:41:41 +00:00
|
|
|
|
|
|
|
let rpcHttpServer = RpcHttpServer.new()
|
|
|
|
# Note: Set maxRequestBodySize to 4MB instead of 1MB as there are blocks
|
|
|
|
# that reach that limit (in hex, for gossip method).
|
|
|
|
rpcHttpServer.addHttpServer(ta, maxRequestBodySize = 4 * 1_048_576)
|
|
|
|
var rpcHttpServerWithProxy = RpcProxy.new(rpcHttpServer, config.proxyUri)
|
|
|
|
|
2021-08-27 16:04:55 +00:00
|
|
|
rpcHttpServerWithProxy.installDiscoveryApiHandlers(d)
|
2023-04-05 14:14:42 +00:00
|
|
|
rpcHttpServerWithProxy.installWeb3ApiHandlers()
|
2024-07-09 17:22:25 +00:00
|
|
|
if node.stateNetwork.isSome():
|
2023-03-17 09:19:17 +00:00
|
|
|
rpcHttpServerWithProxy.installPortalApiHandlers(
|
2024-07-09 17:22:25 +00:00
|
|
|
node.stateNetwork.value.portalProtocol, "state"
|
2024-02-28 17:31:45 +00:00
|
|
|
)
|
2024-07-09 17:22:25 +00:00
|
|
|
if node.historyNetwork.isSome():
|
2023-10-09 15:49:15 +00:00
|
|
|
rpcHttpServerWithProxy.installEthApiHandlers(
|
2024-07-09 17:22:25 +00:00
|
|
|
node.historyNetwork.value, node.beaconLightClient, node.stateNetwork
|
2024-02-28 17:31:45 +00:00
|
|
|
)
|
2023-03-17 09:19:17 +00:00
|
|
|
rpcHttpServerWithProxy.installPortalApiHandlers(
|
2024-07-09 17:22:25 +00:00
|
|
|
node.historyNetwork.value.portalProtocol, "history"
|
2024-02-28 17:31:45 +00:00
|
|
|
)
|
2023-03-17 09:19:17 +00:00
|
|
|
rpcHttpServerWithProxy.installPortalDebugApiHandlers(
|
2024-07-09 17:22:25 +00:00
|
|
|
node.historyNetwork.value.portalProtocol, "history"
|
2024-02-28 17:31:45 +00:00
|
|
|
)
|
2024-07-09 17:22:25 +00:00
|
|
|
if node.beaconNetwork.isSome():
|
2023-03-17 09:19:17 +00:00
|
|
|
rpcHttpServerWithProxy.installPortalApiHandlers(
|
2024-07-09 17:22:25 +00:00
|
|
|
node.beaconNetwork.value.portalProtocol, "beacon"
|
2024-02-28 17:31:45 +00:00
|
|
|
)
|
2023-03-17 09:19:17 +00:00
|
|
|
# TODO: Test proxy with remote node over HTTPS
|
2021-08-05 06:14:25 +00:00
|
|
|
waitFor rpcHttpServerWithProxy.start()
|
2021-06-18 17:20:48 +00:00
|
|
|
|
2021-06-16 19:18:45 +00:00
|
|
|
runForever()
|
|
|
|
|
|
|
|
when isMainModule:
|
|
|
|
{.pop.}
|
2023-09-07 14:27:13 +00:00
|
|
|
let config = PortalConf.load(
|
|
|
|
version = clientName & " " & fullVersionStr & "\p\p" & nimBanner,
|
2024-02-28 17:31:45 +00:00
|
|
|
copyrightBanner = copyrightBanner,
|
2023-09-07 14:27:13 +00:00
|
|
|
)
|
2023-01-31 12:38:08 +00:00
|
|
|
{.push raises: [].}
|
2021-06-16 19:18:45 +00:00
|
|
|
|
|
|
|
case config.cmd
|
2022-01-18 14:08:02 +00:00
|
|
|
of PortalCmd.noCommand:
|
|
|
|
run(config)
|