2020-04-24 07:16:11 +00:00
|
|
|
# beacon_chain
|
2021-01-14 08:43:21 +00:00
|
|
|
# Copyright (c) 2018-2021 Status Research & Development GmbH
|
2020-04-24 07:16:11 +00:00
|
|
|
# Licensed and distributed under either of
|
|
|
|
# * MIT license (license terms in the root directory or at https://opensource.org/licenses/MIT).
|
|
|
|
# * Apache v2 license (license terms in the root directory or at https://www.apache.org/licenses/LICENSE-2.0).
|
|
|
|
# at your option. This file may not be copied, modified, or distributed except according to those terms.
|
|
|
|
|
2018-11-23 23:58:49 +00:00
|
|
|
import
|
2019-10-02 12:38:14 +00:00
|
|
|
# Standard library
|
2021-01-25 17:39:56 +00:00
|
|
|
std/[math, os, sequtils, strformat, strutils, tables, times,
|
2021-01-19 17:44:03 +00:00
|
|
|
terminal, osproc],
|
2020-12-14 16:45:14 +00:00
|
|
|
system/ansi_c,
|
2019-10-02 12:38:14 +00:00
|
|
|
|
|
|
|
# Nimble packages
|
2020-08-19 13:12:10 +00:00
|
|
|
stew/[objects, byteutils, endians2, io2], stew/shims/macros,
|
2020-11-27 19:48:33 +00:00
|
|
|
chronos, confutils, metrics, json_rpc/[rpcclient, rpcserver, jsonmarshal],
|
2020-08-24 12:56:45 +00:00
|
|
|
chronicles, bearssl, blscurve,
|
2020-03-16 22:28:54 +00:00
|
|
|
json_serialization/std/[options, sets, net], serialization/errors,
|
2020-07-09 22:08:54 +00:00
|
|
|
|
2021-02-16 20:35:10 +00:00
|
|
|
eth/[keys, async_utils], eth/net/nat,
|
2020-07-09 22:08:54 +00:00
|
|
|
eth/db/[kvstore, kvstore_sqlite3],
|
2021-01-19 17:44:03 +00:00
|
|
|
eth/p2p/enode, eth/p2p/discoveryv5/[protocol, enr, random2],
|
2019-10-02 12:38:14 +00:00
|
|
|
|
|
|
|
# Local modules
|
2021-02-22 16:17:48 +00:00
|
|
|
"."/[
|
2021-03-05 13:12:00 +00:00
|
|
|
beacon_chain_db,
|
2021-02-22 16:17:48 +00:00
|
|
|
beacon_node_common, beacon_node_status, beacon_node_types, conf,
|
2021-03-05 13:12:00 +00:00
|
|
|
extras, filepath, interop,
|
2021-03-02 10:27:45 +00:00
|
|
|
nimbus_binary_common, ssz/merkleization, statusbar,
|
2021-03-05 13:12:00 +00:00
|
|
|
beacon_clock, version],
|
|
|
|
./networking/[eth2_discovery, eth2_network, network_metadata],
|
2021-03-11 10:10:57 +00:00
|
|
|
./gossip_processing/[eth2_processor, gossip_to_consensus, consensus_manager],
|
2021-03-06 07:32:55 +00:00
|
|
|
./validators/[attestation_aggregation, validator_duties, validator_pool, slashing_protection, keystore_management],
|
2021-03-02 10:27:45 +00:00
|
|
|
./sync/[sync_manager, sync_protocol, request_manager],
|
2020-10-27 09:00:57 +00:00
|
|
|
./rpc/[beacon_api, config_api, debug_api, event_api, nimbus_api, node_api,
|
|
|
|
validator_api],
|
2021-02-22 16:17:48 +00:00
|
|
|
./spec/[
|
|
|
|
datatypes, digest, crypto, beaconstate, eth2_apis/beacon_rpc_client,
|
|
|
|
helpers, network, presets, validator, weak_subjectivity, signatures],
|
2021-03-04 09:13:44 +00:00
|
|
|
./consensus_object_pools/[blockchain_dag, block_quarantine, block_clearance, block_pools_types, attestation_pool, exit_pool],
|
2021-03-03 06:23:05 +00:00
|
|
|
./eth1/eth1_monitor
|
2018-11-23 23:58:49 +00:00
|
|
|
|
2020-12-04 16:28:42 +00:00
|
|
|
from eth/common/eth_types import BlockHashOrNumber
|
|
|
|
|
2021-02-09 09:20:55 +00:00
|
|
|
from
|
|
|
|
libp2p/protocols/pubsub/gossipsub
|
|
|
|
import
|
|
|
|
TopicParams, validateParameters, init
|
|
|
|
|
2018-11-23 23:58:49 +00:00
|
|
|
const
|
2021-02-22 16:17:48 +00:00
|
|
|
hasPrompt = false and not defined(withoutPrompt) # disabled, doesn't work
|
2019-03-18 03:54:08 +00:00
|
|
|
|
2020-02-19 08:58:10 +00:00
|
|
|
type
|
2020-05-06 13:23:45 +00:00
|
|
|
RpcServer* = RpcHttpServer
|
2020-03-16 22:28:54 +00:00
|
|
|
|
2020-06-05 15:08:50 +00:00
|
|
|
template init(T: type RpcHttpServer, ip: ValidIpAddress, port: Port): T =
|
2020-03-16 22:28:54 +00:00
|
|
|
newRpcHttpServer([initTAddress(ip, port)])
|
2020-02-19 08:58:10 +00:00
|
|
|
|
2019-10-24 06:51:27 +00:00
|
|
|
# https://github.com/ethereum/eth2.0-metrics/blob/master/metrics.md#interop-metrics
|
2020-11-27 22:16:13 +00:00
|
|
|
declareGauge beacon_slot, "Latest slot of the beacon chain state"
|
|
|
|
declareGauge beacon_current_epoch, "Current epoch"
|
2019-09-07 17:48:05 +00:00
|
|
|
|
2020-07-30 14:27:34 +00:00
|
|
|
# Finalization tracking
|
|
|
|
declareGauge finalization_delay,
|
|
|
|
"Epoch delay between scheduled epoch and finalized epoch"
|
|
|
|
|
2020-08-10 18:49:45 +00:00
|
|
|
declareGauge ticks_delay,
|
|
|
|
"How long does to take to run the onSecond loop"
|
|
|
|
|
2021-03-12 09:46:26 +00:00
|
|
|
declareGauge next_action_wait,
|
|
|
|
"Seconds until the next attestation will be sent"
|
|
|
|
|
2019-09-12 01:45:04 +00:00
|
|
|
logScope: topics = "beacnde"
|
|
|
|
|
2020-06-30 13:53:57 +00:00
|
|
|
func enrForkIdFromState(state: BeaconState): ENRForkID =
|
2020-04-15 02:41:22 +00:00
|
|
|
let
|
|
|
|
forkVer = state.fork.current_version
|
|
|
|
forkDigest = compute_fork_digest(forkVer, state.genesis_validators_root)
|
|
|
|
|
|
|
|
ENRForkID(
|
|
|
|
fork_digest: forkDigest,
|
|
|
|
next_fork_version: forkVer,
|
|
|
|
next_fork_epoch: FAR_FUTURE_EPOCH)
|
|
|
|
|
2020-06-29 17:30:19 +00:00
|
|
|
proc init*(T: type BeaconNode,
|
2021-01-29 21:21:44 +00:00
|
|
|
runtimePreset: RuntimePreset,
|
2020-06-29 17:30:19 +00:00
|
|
|
rng: ref BrHmacDrbgContext,
|
2021-02-22 16:17:48 +00:00
|
|
|
config: BeaconNodeConf,
|
2020-12-04 16:28:42 +00:00
|
|
|
depositContractAddress: Eth1Address,
|
|
|
|
depositContractDeployedAt: BlockHashOrNumber,
|
2020-11-24 21:21:47 +00:00
|
|
|
eth1Network: Option[Eth1Network],
|
2021-02-22 16:17:48 +00:00
|
|
|
genesisStateContents: string,
|
|
|
|
genesisDepositsSnapshotContents: string): BeaconNode =
|
2020-01-17 13:44:01 +00:00
|
|
|
let
|
2021-02-22 16:17:48 +00:00
|
|
|
db = BeaconChainDB.init(runtimePreset, config.databaseDir)
|
2020-01-17 13:44:01 +00:00
|
|
|
|
2020-09-22 20:42:42 +00:00
|
|
|
var
|
|
|
|
genesisState, checkpointState: ref BeaconState
|
|
|
|
checkpointBlock: SignedBeaconBlock
|
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
if config.finalizedCheckpointState.isSome:
|
|
|
|
let checkpointStatePath = config.finalizedCheckpointState.get.string
|
2020-09-22 20:42:42 +00:00
|
|
|
checkpointState = try:
|
|
|
|
newClone(SSZ.loadFile(checkpointStatePath, BeaconState))
|
|
|
|
except SerializationError as err:
|
|
|
|
fatal "Checkpoint state deserialization failed",
|
|
|
|
err = formatMsg(err, checkpointStatePath)
|
|
|
|
quit 1
|
|
|
|
except CatchableError as err:
|
|
|
|
fatal "Failed to read checkpoint state file", err = err.msg
|
|
|
|
quit 1
|
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
if config.finalizedCheckpointBlock.isNone:
|
2020-09-22 20:42:42 +00:00
|
|
|
if checkpointState.slot > 0:
|
|
|
|
fatal "Specifying a non-genesis --finalized-checkpoint-state requires specifying --finalized-checkpoint-block as well"
|
|
|
|
quit 1
|
|
|
|
else:
|
2021-02-22 16:17:48 +00:00
|
|
|
let checkpointBlockPath = config.finalizedCheckpointBlock.get.string
|
2020-09-22 20:42:42 +00:00
|
|
|
try:
|
|
|
|
checkpointBlock = SSZ.loadFile(checkpointBlockPath, SignedBeaconBlock)
|
|
|
|
except SerializationError as err:
|
|
|
|
fatal "Invalid checkpoint block", err = err.formatMsg(checkpointBlockPath)
|
|
|
|
quit 1
|
|
|
|
except IOError as err:
|
|
|
|
fatal "Failed to load the checkpoint block", err = err.msg
|
|
|
|
quit 1
|
2021-02-22 16:17:48 +00:00
|
|
|
elif config.finalizedCheckpointBlock.isSome:
|
2020-09-22 20:42:42 +00:00
|
|
|
# TODO We can download the state from somewhere in the future relying
|
|
|
|
# on the trusted `state_root` appearing in the checkpoint block.
|
|
|
|
fatal "--finalized-checkpoint-block cannot be specified without --finalized-checkpoint-state"
|
|
|
|
quit 1
|
2020-01-17 13:44:01 +00:00
|
|
|
|
2020-11-16 19:15:43 +00:00
|
|
|
var eth1Monitor: Eth1Monitor
|
2020-07-31 14:49:06 +00:00
|
|
|
if not ChainDAGRef.isInitialized(db):
|
2020-09-22 20:42:42 +00:00
|
|
|
var
|
|
|
|
tailState: ref BeaconState
|
|
|
|
tailBlock: SignedBeaconBlock
|
2020-01-17 13:44:01 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
if genesisStateContents.len == 0 and checkpointState == nil:
|
2020-11-24 21:21:47 +00:00
|
|
|
when hasGenesisDetection:
|
|
|
|
if genesisDepositsSnapshotContents != nil:
|
|
|
|
fatal "A deposits snapshot cannot be provided without also providing a matching beacon state snapshot"
|
|
|
|
quit 1
|
|
|
|
|
|
|
|
# This is a fresh start without a known genesis state
|
|
|
|
# (most likely, it hasn't arrived yet). We'll try to
|
|
|
|
# obtain a genesis through the Eth1 deposits monitor:
|
2021-02-22 16:17:48 +00:00
|
|
|
if config.web3Url.len == 0:
|
2020-11-24 21:21:47 +00:00
|
|
|
fatal "Web3 URL not specified"
|
|
|
|
quit 1
|
|
|
|
|
|
|
|
# TODO Could move this to a separate "GenesisMonitor" process or task
|
|
|
|
# that would do only this - see Paul's proposal for this.
|
2021-02-22 16:17:48 +00:00
|
|
|
let eth1MonitorRes = waitFor Eth1Monitor.init(
|
2021-01-29 21:21:44 +00:00
|
|
|
runtimePreset,
|
2020-12-03 04:30:35 +00:00
|
|
|
db,
|
2021-02-22 16:17:48 +00:00
|
|
|
config.web3Url,
|
2020-12-04 16:28:42 +00:00
|
|
|
depositContractAddress,
|
|
|
|
depositContractDeployedAt,
|
2020-11-24 21:21:47 +00:00
|
|
|
eth1Network)
|
|
|
|
|
|
|
|
if eth1MonitorRes.isErr:
|
|
|
|
fatal "Failed to start Eth1 monitor",
|
|
|
|
reason = eth1MonitorRes.error,
|
2021-02-22 16:17:48 +00:00
|
|
|
web3Url = config.web3Url,
|
2020-12-04 16:28:42 +00:00
|
|
|
depositContractAddress,
|
|
|
|
depositContractDeployedAt
|
2020-11-24 21:21:47 +00:00
|
|
|
quit 1
|
|
|
|
else:
|
|
|
|
eth1Monitor = eth1MonitorRes.get
|
2020-06-27 12:01:19 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
genesisState = waitFor eth1Monitor.waitGenesis()
|
2020-11-24 21:21:47 +00:00
|
|
|
if bnStatus == BeaconNodeStatus.Stopping:
|
|
|
|
return nil
|
2020-06-27 12:01:19 +00:00
|
|
|
|
2020-11-24 21:21:47 +00:00
|
|
|
tailState = genesisState
|
|
|
|
tailBlock = get_initial_beacon_block(genesisState[])
|
2020-06-27 12:01:19 +00:00
|
|
|
|
2020-11-24 21:21:47 +00:00
|
|
|
notice "Eth2 genesis state detected",
|
|
|
|
genesisTime = genesisState.genesisTime,
|
|
|
|
eth1Block = genesisState.eth1_data.block_hash,
|
|
|
|
totalDeposits = genesisState.eth1_data.deposit_count
|
2020-11-12 16:21:04 +00:00
|
|
|
else:
|
2020-11-24 21:21:47 +00:00
|
|
|
fatal "The beacon node must be compiled with -d:has_genesis_detection " &
|
|
|
|
"in order to support monitoring for genesis events"
|
|
|
|
quit 1
|
2019-10-25 14:53:31 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
elif genesisStateContents.len == 0:
|
2020-09-22 20:42:42 +00:00
|
|
|
if checkpointState.slot == GENESIS_SLOT:
|
|
|
|
genesisState = checkpointState
|
|
|
|
tailState = checkpointState
|
|
|
|
tailBlock = get_initial_beacon_block(genesisState[])
|
|
|
|
else:
|
|
|
|
fatal "State checkpoints cannot be provided for a network without a known genesis state"
|
2020-04-22 23:35:55 +00:00
|
|
|
quit 1
|
2020-09-22 20:42:42 +00:00
|
|
|
else:
|
2020-04-22 23:35:55 +00:00
|
|
|
try:
|
2021-02-22 16:17:48 +00:00
|
|
|
genesisState = newClone(SSZ.decode(genesisStateContents, BeaconState))
|
2020-09-22 20:42:42 +00:00
|
|
|
except CatchableError as err:
|
2020-11-16 19:15:43 +00:00
|
|
|
raiseAssert "Invalid baked-in state: " & err.msg
|
2020-01-17 13:44:01 +00:00
|
|
|
|
2020-09-22 20:42:42 +00:00
|
|
|
if checkpointState != nil:
|
|
|
|
tailState = checkpointState
|
|
|
|
tailBlock = checkpointBlock
|
|
|
|
else:
|
|
|
|
tailState = genesisState
|
|
|
|
tailBlock = get_initial_beacon_block(genesisState[])
|
|
|
|
|
|
|
|
try:
|
|
|
|
ChainDAGRef.preInit(db, genesisState[], tailState[], tailBlock)
|
|
|
|
doAssert ChainDAGRef.isInitialized(db), "preInit should have initialized db"
|
|
|
|
except CatchableError as e:
|
|
|
|
error "Failed to initialize database", err = e.msg
|
|
|
|
quit 1
|
2020-07-02 15:52:48 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
info "Loading block dag from database", path = config.databaseDir
|
2020-11-16 19:15:43 +00:00
|
|
|
|
2020-07-07 23:02:14 +00:00
|
|
|
let
|
2021-02-22 16:17:48 +00:00
|
|
|
chainDagFlags = if config.verifyFinalization: {verifyFinalization}
|
2020-07-07 23:02:14 +00:00
|
|
|
else: {}
|
2021-01-29 21:21:44 +00:00
|
|
|
chainDag = ChainDAGRef.init(runtimePreset, db, chainDagFlags)
|
2020-09-22 20:42:42 +00:00
|
|
|
beaconClock = BeaconClock.init(chainDag.headState.data.data)
|
2021-01-25 18:45:48 +00:00
|
|
|
quarantine = QuarantineRef.init(rng)
|
2020-11-25 01:09:31 +00:00
|
|
|
databaseGenesisValidatorsRoot =
|
|
|
|
chainDag.headState.data.data.genesis_validators_root
|
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
if genesisStateContents.len != 0:
|
2020-11-25 01:09:31 +00:00
|
|
|
let
|
|
|
|
networkGenesisValidatorsRoot =
|
2021-02-22 16:17:48 +00:00
|
|
|
extractGenesisValidatorRootFromSnapshop(genesisStateContents)
|
2020-11-25 01:09:31 +00:00
|
|
|
|
|
|
|
if networkGenesisValidatorsRoot != databaseGenesisValidatorsRoot:
|
|
|
|
fatal "The specified --data-dir contains data for a different network",
|
|
|
|
networkGenesisValidatorsRoot, databaseGenesisValidatorsRoot,
|
2021-02-22 16:17:48 +00:00
|
|
|
dataDir = config.dataDir
|
2020-11-25 01:09:31 +00:00
|
|
|
quit 1
|
2020-01-17 13:44:01 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
if config.weakSubjectivityCheckpoint.isSome:
|
2020-09-22 20:42:42 +00:00
|
|
|
let
|
|
|
|
currentSlot = beaconClock.now.slotOrZero
|
|
|
|
isCheckpointStale = not is_within_weak_subjectivity_period(
|
|
|
|
currentSlot,
|
|
|
|
chainDag.headState.data.data,
|
2021-02-22 16:17:48 +00:00
|
|
|
config.weakSubjectivityCheckpoint.get)
|
2020-09-22 20:42:42 +00:00
|
|
|
|
|
|
|
if isCheckpointStale:
|
|
|
|
error "Weak subjectivity checkpoint is stale",
|
|
|
|
currentSlot,
|
2021-02-22 16:17:48 +00:00
|
|
|
checkpoint = config.weakSubjectivityCheckpoint.get,
|
2020-09-22 20:42:42 +00:00
|
|
|
headStateSlot = chainDag.headState.data.data.slot
|
|
|
|
quit 1
|
|
|
|
|
|
|
|
if checkpointState != nil:
|
2020-11-25 01:09:31 +00:00
|
|
|
let checkpointGenesisValidatorsRoot = checkpointState[].genesis_validators_root
|
|
|
|
if checkpointGenesisValidatorsRoot != databaseGenesisValidatorsRoot:
|
|
|
|
fatal "The specified checkpoint state is intended for a different network",
|
|
|
|
checkpointGenesisValidatorsRoot, databaseGenesisValidatorsRoot,
|
2021-02-22 16:17:48 +00:00
|
|
|
dataDir = config.dataDir
|
2020-11-25 01:09:31 +00:00
|
|
|
quit 1
|
|
|
|
|
2020-09-22 20:42:42 +00:00
|
|
|
chainDag.setTailState(checkpointState[], checkpointBlock)
|
|
|
|
|
2020-11-03 01:21:07 +00:00
|
|
|
if eth1Monitor.isNil and
|
2021-02-22 16:17:48 +00:00
|
|
|
config.web3Url.len > 0 and
|
|
|
|
genesisDepositsSnapshotContents.len > 0:
|
|
|
|
let genesisDepositsSnapshot = SSZ.decode(genesisDepositsSnapshotContents,
|
2020-11-24 21:21:47 +00:00
|
|
|
DepositContractSnapshot)
|
2020-12-15 21:59:29 +00:00
|
|
|
eth1Monitor = Eth1Monitor.init(
|
2021-01-29 21:21:44 +00:00
|
|
|
runtimePreset,
|
2020-12-03 04:30:35 +00:00
|
|
|
db,
|
2021-02-22 16:17:48 +00:00
|
|
|
config.web3Url,
|
2020-12-04 16:28:42 +00:00
|
|
|
depositContractAddress,
|
2020-11-24 21:21:47 +00:00
|
|
|
genesisDepositsSnapshot,
|
2020-11-12 16:21:04 +00:00
|
|
|
eth1Network)
|
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
let rpcServer = if config.rpcEnabled:
|
|
|
|
RpcServer.init(config.rpcAddress, config.rpcPort)
|
2020-03-16 22:28:54 +00:00
|
|
|
else:
|
|
|
|
nil
|
|
|
|
|
2020-04-15 02:41:22 +00:00
|
|
|
let
|
2021-02-22 16:17:48 +00:00
|
|
|
netKeys = getPersistentNetKeys(rng[], config)
|
|
|
|
nickname = if config.nodeName == "auto": shortForm(netKeys)
|
|
|
|
else: config.nodeName
|
2020-07-30 19:18:17 +00:00
|
|
|
enrForkId = enrForkIdFromState(chainDag.headState.data.data)
|
2020-04-15 02:41:22 +00:00
|
|
|
topicBeaconBlocks = getBeaconBlocksTopic(enrForkId.forkDigest)
|
|
|
|
topicAggregateAndProofs = getAggregateAndProofsTopic(enrForkId.forkDigest)
|
2021-02-22 16:17:48 +00:00
|
|
|
network = createEth2Node(rng, config, netKeys, enrForkId)
|
2020-08-20 16:30:47 +00:00
|
|
|
attestationPool = newClone(AttestationPool.init(chainDag, quarantine))
|
2020-09-14 14:26:31 +00:00
|
|
|
exitPool = newClone(ExitPool.init(chainDag, quarantine))
|
2021-02-22 16:17:48 +00:00
|
|
|
|
|
|
|
slashingProtectionDB =
|
|
|
|
case config.slashingDbKind
|
|
|
|
of SlashingDbKind.v1:
|
|
|
|
info "Loading slashing protection database", path = config.validatorsDir()
|
|
|
|
SlashingProtectionDB.init(
|
|
|
|
chainDag.headState.data.data.genesis_validators_root,
|
|
|
|
config.validatorsDir(), "slashing_protection",
|
|
|
|
modes = {kCompleteArchiveV1},
|
|
|
|
disagreementBehavior = kChooseV1
|
|
|
|
)
|
|
|
|
of SlashingDbKind.v2:
|
|
|
|
info "Loading slashing protection database (v2)", path = config.validatorsDir()
|
|
|
|
SlashingProtectionDB.init(
|
|
|
|
chainDag.headState.data.data.genesis_validators_root,
|
|
|
|
config.validatorsDir(), "slashing_protection"
|
|
|
|
)
|
|
|
|
of SlashingDbKind.both:
|
|
|
|
info "Loading slashing protection database (dual DB mode)", path = config.validatorsDir()
|
|
|
|
SlashingProtectionDB.init(
|
|
|
|
chainDag.headState.data.data.genesis_validators_root,
|
|
|
|
config.validatorsDir(), "slashing_protection",
|
|
|
|
modes = {kCompleteArchiveV1, kCompleteArchiveV2},
|
|
|
|
disagreementBehavior = kChooseV2
|
|
|
|
)
|
|
|
|
validatorPool = newClone(ValidatorPool.init(slashingProtectionDB))
|
2021-03-11 10:10:57 +00:00
|
|
|
|
|
|
|
consensusManager = ConsensusManager.new(
|
|
|
|
chainDag, attestationPool, quarantine
|
|
|
|
)
|
|
|
|
verifQueues = VerifQueueManager.new(
|
|
|
|
config, consensusManager,
|
|
|
|
proc(): BeaconTime = beaconClock.now())
|
2021-02-22 16:17:48 +00:00
|
|
|
processor = Eth2Processor.new(
|
2021-03-11 10:10:57 +00:00
|
|
|
config,
|
|
|
|
verifQueues,
|
|
|
|
chainDag, attestationPool, exitPool, validatorPool,
|
|
|
|
quarantine,
|
|
|
|
proc(): BeaconTime = beaconClock.now())
|
2021-02-22 16:17:48 +00:00
|
|
|
|
2020-01-17 13:44:01 +00:00
|
|
|
var res = BeaconNode(
|
|
|
|
nickname: nickname,
|
2021-02-22 16:17:48 +00:00
|
|
|
graffitiBytes: if config.graffiti.isSome: config.graffiti.get.GraffitiBytes
|
2020-06-29 17:30:19 +00:00
|
|
|
else: defaultGraffitiBytes(),
|
2020-01-17 13:44:01 +00:00
|
|
|
network: network,
|
2020-02-05 20:40:14 +00:00
|
|
|
netKeys: netKeys,
|
2020-01-17 13:44:01 +00:00
|
|
|
db: db,
|
2021-02-22 16:17:48 +00:00
|
|
|
config: config,
|
2020-07-30 19:18:17 +00:00
|
|
|
chainDag: chainDag,
|
|
|
|
quarantine: quarantine,
|
2020-08-20 16:30:47 +00:00
|
|
|
attestationPool: attestationPool,
|
2021-02-22 16:17:48 +00:00
|
|
|
attachedValidators: validatorPool,
|
2020-09-14 14:26:31 +00:00
|
|
|
exitPool: exitPool,
|
2020-11-03 01:21:07 +00:00
|
|
|
eth1Monitor: eth1Monitor,
|
2020-09-22 20:42:42 +00:00
|
|
|
beaconClock: beaconClock,
|
2020-03-16 22:28:54 +00:00
|
|
|
rpcServer: rpcServer,
|
2020-04-15 02:41:22 +00:00
|
|
|
forkDigest: enrForkId.forkDigest,
|
|
|
|
topicBeaconBlocks: topicBeaconBlocks,
|
|
|
|
topicAggregateAndProofs: topicAggregateAndProofs,
|
2021-02-22 16:17:48 +00:00
|
|
|
processor: processor,
|
2021-03-11 10:10:57 +00:00
|
|
|
verifQueues: verifQueues,
|
|
|
|
consensusManager: consensusManager,
|
|
|
|
requestManager: RequestManager.init(network, verifQueues)
|
2020-01-17 13:44:01 +00:00
|
|
|
)
|
2020-08-20 16:30:47 +00:00
|
|
|
|
2021-01-15 04:17:06 +00:00
|
|
|
# set topic validation routine
|
|
|
|
network.setValidTopics(
|
|
|
|
block:
|
|
|
|
var
|
|
|
|
topics = @[
|
|
|
|
topicBeaconBlocks,
|
|
|
|
getAttesterSlashingsTopic(enrForkId.forkDigest),
|
|
|
|
getProposerSlashingsTopic(enrForkId.forkDigest),
|
|
|
|
getVoluntaryExitsTopic(enrForkId.forkDigest),
|
|
|
|
getAggregateAndProofsTopic(enrForkId.forkDigest)
|
|
|
|
]
|
|
|
|
for subnet in 0'u64 ..< ATTESTATION_SUBNET_COUNT:
|
|
|
|
topics &= getAttestationTopic(enrForkId.forkDigest, subnet)
|
|
|
|
topics)
|
|
|
|
|
2020-09-01 13:44:40 +00:00
|
|
|
if res.config.inProcessValidators:
|
|
|
|
res.addLocalValidators()
|
|
|
|
else:
|
2020-11-07 18:00:31 +00:00
|
|
|
let cmd = getAppDir() / "nimbus_signing_process".addFileExt(ExeExt)
|
2020-09-22 08:27:46 +00:00
|
|
|
let args = [$res.config.validatorsDir, $res.config.secretsDir]
|
|
|
|
let workdir = io2.getCurrentDir().tryGet()
|
|
|
|
res.vcProcess = startProcess(cmd, workdir, args)
|
2020-09-01 13:44:40 +00:00
|
|
|
res.addRemoteValidators()
|
2020-06-11 12:13:12 +00:00
|
|
|
|
|
|
|
# This merely configures the BeaconSync
|
|
|
|
# The traffic will be started when we join the network.
|
2020-07-30 19:18:17 +00:00
|
|
|
network.initBeaconSync(chainDag, enrForkId.forkDigest)
|
2020-12-16 13:03:04 +00:00
|
|
|
|
|
|
|
res.updateValidatorMetrics()
|
|
|
|
|
2020-01-17 13:44:01 +00:00
|
|
|
return res
|
2019-09-07 17:48:05 +00:00
|
|
|
|
2020-05-13 08:36:33 +00:00
|
|
|
func verifyFinalization(node: BeaconNode, slot: Slot) =
|
|
|
|
# Epoch must be >= 4 to check finalization
|
|
|
|
const SETTLING_TIME_OFFSET = 1'u64
|
|
|
|
let epoch = slot.compute_epoch_at_slot()
|
|
|
|
|
|
|
|
# Don't static-assert this -- if this isn't called, don't require it
|
|
|
|
doAssert SLOTS_PER_EPOCH > SETTLING_TIME_OFFSET
|
|
|
|
|
|
|
|
# Intentionally, loudly assert. Point is to fail visibly and unignorably
|
|
|
|
# during testing.
|
|
|
|
if epoch >= 4 and slot mod SLOTS_PER_EPOCH > SETTLING_TIME_OFFSET:
|
|
|
|
let finalizedEpoch =
|
2020-07-30 19:18:17 +00:00
|
|
|
node.chainDag.finalizedHead.slot.compute_epoch_at_slot()
|
2020-05-13 08:36:33 +00:00
|
|
|
# Finalization rule 234, that has the most lag slots among the cases, sets
|
|
|
|
# state.finalized_checkpoint = old_previous_justified_checkpoint.epoch + 3
|
|
|
|
# and then state.slot gets incremented, to increase the maximum offset, if
|
|
|
|
# finalization occurs every slot, to 4 slots vs scheduledSlot.
|
|
|
|
doAssert finalizedEpoch + 4 >= epoch
|
|
|
|
|
2020-12-24 08:48:52 +00:00
|
|
|
proc installAttestationSubnetHandlers(node: BeaconNode, subnets: set[uint8]) =
|
2021-03-02 06:04:14 +00:00
|
|
|
# https://github.com/ethereum/eth2.0-specs/blob/v1.0.1/specs/phase0/p2p-interface.md#attestations-and-aggregation
|
2021-02-09 09:20:55 +00:00
|
|
|
# nimbus won't score attestation subnets for now, we just rely on block and aggregate which are more stabe and reliable
|
2020-08-12 17:48:31 +00:00
|
|
|
for subnet in subnets:
|
2021-02-09 09:20:55 +00:00
|
|
|
node.network.subscribe(getAttestationTopic(node.forkDigest, subnet), TopicParams.init()) # don't score attestation subnets for now
|
2020-08-12 17:48:31 +00:00
|
|
|
|
2020-12-22 09:05:36 +00:00
|
|
|
proc updateStabilitySubnetMetadata(
|
|
|
|
node: BeaconNode, stabilitySubnets: set[uint8]) =
|
2021-03-02 06:04:14 +00:00
|
|
|
# https://github.com/ethereum/eth2.0-specs/blob/v1.0.1/specs/phase0/p2p-interface.md#metadata
|
2020-08-12 17:48:31 +00:00
|
|
|
node.network.metadata.seq_number += 1
|
2020-12-18 08:50:29 +00:00
|
|
|
for subnet in 0'u8 ..< ATTESTATION_SUBNET_COUNT:
|
2020-12-22 09:05:36 +00:00
|
|
|
node.network.metadata.attnets[subnet] = (subnet in stabilitySubnets)
|
2020-12-18 08:50:29 +00:00
|
|
|
|
2021-03-02 06:04:14 +00:00
|
|
|
# https://github.com/ethereum/eth2.0-specs/blob/v1.0.1/specs/phase0/validator.md#phase-0-attestation-subnet-stability
|
|
|
|
# https://github.com/ethereum/eth2.0-specs/blob/v1.0.1/specs/phase0/p2p-interface.md#attestation-subnet-bitfield
|
2020-12-18 08:50:29 +00:00
|
|
|
let res = node.network.discovery.updateRecord(
|
|
|
|
{"attnets": SSZ.encode(node.network.metadata.attnets)})
|
|
|
|
if res.isErr():
|
|
|
|
# This should not occur in this scenario as the private key would always
|
|
|
|
# be the correct one and the ENR will not increase in size.
|
|
|
|
warn "Failed to update record on subnet cycle", error = res.error
|
|
|
|
else:
|
2020-12-22 09:05:36 +00:00
|
|
|
debug "Stability subnets changed; updated ENR attnets", stabilitySubnets
|
2020-08-12 17:48:31 +00:00
|
|
|
|
2020-12-22 09:05:36 +00:00
|
|
|
func getStabilitySubnets(stabilitySubnets: auto): set[uint8] =
|
|
|
|
for subnetInfo in stabilitySubnets:
|
|
|
|
result.incl subnetInfo.subnet
|
|
|
|
|
2021-01-25 17:39:56 +00:00
|
|
|
proc getAttachedValidators(node: BeaconNode):
|
|
|
|
Table[ValidatorIndex, AttachedValidator] =
|
2021-01-14 08:43:21 +00:00
|
|
|
for validatorIndex in 0 ..< node.chainDag.headState.data.data.validators.len:
|
2021-01-25 17:39:56 +00:00
|
|
|
let attachedValidator = node.getAttachedValidator(
|
|
|
|
node.chainDag.headState.data.data, validatorIndex.ValidatorIndex)
|
|
|
|
if attachedValidator.isNil:
|
|
|
|
continue
|
|
|
|
result[validatorIndex.ValidatorIndex] = attachedValidator
|
2021-01-19 17:44:03 +00:00
|
|
|
|
2021-01-25 17:39:56 +00:00
|
|
|
proc updateSubscriptionSchedule(node: BeaconNode, epoch: Epoch) {.async.} =
|
2021-01-19 17:44:03 +00:00
|
|
|
doAssert epoch >= 1
|
2021-01-25 17:39:56 +00:00
|
|
|
let
|
|
|
|
attachedValidators = node.getAttachedValidators()
|
2021-01-26 11:52:00 +00:00
|
|
|
validatorIndices = toIntSet(toSeq(attachedValidators.keys()))
|
2021-01-25 17:39:56 +00:00
|
|
|
|
|
|
|
var cache = StateCache()
|
|
|
|
|
2021-03-02 06:04:14 +00:00
|
|
|
# https://github.com/ethereum/eth2.0-specs/blob/v1.0.1/specs/phase0/validator.md#lookahead
|
2021-01-25 17:39:56 +00:00
|
|
|
# Only subscribe when this node should aggregate; libp2p broadcasting works
|
|
|
|
# on subnet topics regardless.
|
|
|
|
#
|
|
|
|
# Committee sizes in any given epoch vary by 1, i.e. committee sizes $n$
|
|
|
|
# $n+1$ can exist. Furthermore, according to
|
2021-03-02 06:04:14 +00:00
|
|
|
# https://github.com/ethereum/eth2.0-specs/blob/v1.0.1/specs/phase0/validator.md#aggregation-selection
|
2021-01-25 17:39:56 +00:00
|
|
|
# is_aggregator uses `len(committee) div TARGET_AGGREGATORS_PER_COMMITTEE`
|
|
|
|
# to determine whether committee length/slot signature pairs aggregate the
|
|
|
|
# attestations in a slot/committee, where TARGET_AGGREGATORS_PER_COMMITTEE
|
|
|
|
# is currently 16 in all defined presets. Therefore, probe a committee len
|
|
|
|
# to determine whether it's possible that it's within a boundary such that
|
|
|
|
# either that length or other possible committee lengths don't cross those
|
|
|
|
# div/mod 16 boundaries which would change is_aggregator results.
|
|
|
|
static: doAssert TARGET_AGGREGATORS_PER_COMMITTEE == 16 # mainnet, minimal
|
|
|
|
|
|
|
|
let
|
|
|
|
probeCommitteeLen = get_beacon_committee_len(
|
|
|
|
node.chainDag.headState.data.data, compute_start_slot_at_epoch(epoch),
|
|
|
|
0.CommitteeIndex, cache)
|
|
|
|
|
|
|
|
# Without knowing whether probeCommitteeLen is the higher or lower, if it's
|
|
|
|
# [-1, 1] mod TARGET_AGGREGATORS_PER_COMMITTEE it might cross boundaries in
|
|
|
|
# is_aggregator, such that one can't hoist committee length calculation out
|
|
|
|
# of the anyIt(...) loop.
|
|
|
|
isConstAggregationLen =
|
|
|
|
(probeCommitteeLen mod TARGET_AGGREGATORS_PER_COMMITTEE) notin
|
|
|
|
[0'u64, 1'u64, TARGET_AGGREGATORS_PER_COMMITTEE - 1]
|
|
|
|
|
|
|
|
template isAnyCommitteeValidatorAggregating(
|
|
|
|
validatorIndices, committeeLen: untyped, slot: Slot): bool =
|
|
|
|
anyIt(
|
|
|
|
validatorIndices,
|
|
|
|
is_aggregator(
|
|
|
|
committeeLen,
|
2021-01-26 11:52:00 +00:00
|
|
|
await attachedValidators[it.ValidatorIndex].getSlotSig(
|
2021-01-25 17:39:56 +00:00
|
|
|
node.chainDag.headState.data.data.fork,
|
|
|
|
node.chainDag.headState.data.data.genesis_validators_root, slot)))
|
|
|
|
|
2021-02-14 15:37:32 +00:00
|
|
|
# The relevant bitmap are 32 bits each.
|
|
|
|
static: doAssert SLOTS_PER_EPOCH <= 32
|
|
|
|
node.attestationSubnets.lastCalculatedAttestationEpoch = epoch
|
|
|
|
node.attestationSubnets.attestingSlots[epoch mod 2] = 0
|
|
|
|
|
2021-01-25 17:39:56 +00:00
|
|
|
for (validatorIndices, committeeIndex, subnetIndex, slot) in
|
|
|
|
get_committee_assignments(
|
|
|
|
node.chainDag.headState.data.data, epoch, validatorIndices, cache):
|
|
|
|
|
|
|
|
doAssert compute_epoch_at_slot(slot) == epoch
|
|
|
|
let committeeLen =
|
|
|
|
if isConstAggregationLen:
|
|
|
|
probeCommitteeLen
|
|
|
|
else:
|
|
|
|
get_beacon_committee_len(
|
|
|
|
node.chainDag.headState.data.data, slot, committeeIndex, cache)
|
|
|
|
|
2021-02-14 15:37:32 +00:00
|
|
|
# Each get_committee_assignments() call here is on the next epoch. At any
|
|
|
|
# given time, only care about two epochs, the current and next epoch. So,
|
|
|
|
# after it is done for an epoch, [aS[epoch mod 2], aS[1 - (epoch mod 2)]]
|
|
|
|
# provides, sequentially, the current and next epochs' slot schedules. If
|
|
|
|
# get_committee_assignments() has not been called for the next epoch yet,
|
|
|
|
# typically because there hasn't been a block in the current epoch, there
|
|
|
|
# isn't valid information in aS[1 - (epoch mod 2)], and only slots within
|
|
|
|
# the current epoch can be known. Usually, this is not a major issue, but
|
|
|
|
# when there hasn't been a block substantially through an epoch, it might
|
|
|
|
# prove misleading to claim that there aren't attestations known, when it
|
|
|
|
# only might be known either way for 3 more slots. However, it's also not
|
|
|
|
# as important to attest when blocks aren't flowing as only attestions in
|
|
|
|
# blocks garner rewards.
|
|
|
|
node.attestationSubnets.attestingSlots[epoch mod 2] =
|
|
|
|
node.attestationSubnets.attestingSlots[epoch mod 2] or
|
|
|
|
(1'u32 shl (slot mod SLOTS_PER_EPOCH))
|
|
|
|
|
2021-01-25 17:39:56 +00:00
|
|
|
if not isAnyCommitteeValidatorAggregating(
|
|
|
|
validatorIndices, committeeLen, slot):
|
|
|
|
continue
|
|
|
|
|
2021-01-19 17:44:03 +00:00
|
|
|
node.attestationSubnets.unsubscribeSlot[subnetIndex] =
|
|
|
|
max(slot + 1, node.attestationSubnets.unsubscribeSlot[subnetIndex])
|
|
|
|
if subnetIndex notin node.attestationSubnets.subscribedSubnets:
|
|
|
|
const SUBNET_SUBSCRIPTION_LEAD_TIME_SLOTS = 34
|
|
|
|
|
|
|
|
node.attestationSubnets.subscribeSlot[subnetIndex] =
|
|
|
|
# Queue upcoming subscription potentially earlier
|
|
|
|
# SLOTS_PER_EPOCH emulates one boundary condition of the per-epoch
|
|
|
|
# cycling mechanism timing buffers
|
|
|
|
min(
|
|
|
|
slot - min(slot.uint64, SUBNET_SUBSCRIPTION_LEAD_TIME_SLOTS),
|
|
|
|
node.attestationSubnets.subscribeSlot[subnetIndex])
|
|
|
|
|
2021-03-02 06:04:14 +00:00
|
|
|
# https://github.com/ethereum/eth2.0-specs/blob/v1.0.1/specs/phase0/validator.md#phase-0-attestation-subnet-stability
|
2021-01-19 17:44:03 +00:00
|
|
|
proc getStabilitySubnetLength(node: BeaconNode): uint64 =
|
|
|
|
EPOCHS_PER_RANDOM_SUBNET_SUBSCRIPTION +
|
|
|
|
node.network.rng[].rand(EPOCHS_PER_RANDOM_SUBNET_SUBSCRIPTION.int).uint64
|
|
|
|
|
|
|
|
proc updateStabilitySubnets(node: BeaconNode, slot: Slot): set[uint8] =
|
|
|
|
# Equivalent to wallSlot by cycleAttestationSubnets(), especially
|
|
|
|
# since it'll try to run early in epochs, avoiding race conditions.
|
|
|
|
static: doAssert ATTESTATION_SUBNET_COUNT <= high(uint8)
|
|
|
|
let epoch = slot.epoch
|
2021-01-14 08:43:21 +00:00
|
|
|
|
2021-03-02 06:04:14 +00:00
|
|
|
# https://github.com/ethereum/eth2.0-specs/blob/v1.0.1/specs/phase0/validator.md#phase-0-attestation-subnet-stability
|
2021-01-19 17:44:03 +00:00
|
|
|
for i in 0 ..< node.attestationSubnets.stabilitySubnets.len:
|
|
|
|
if epoch >= node.attestationSubnets.stabilitySubnets[i].expiration:
|
|
|
|
node.attestationSubnets.stabilitySubnets[i].subnet =
|
|
|
|
node.network.rng[].rand(ATTESTATION_SUBNET_COUNT - 1).uint8
|
|
|
|
node.attestationSubnets.stabilitySubnets[i].expiration =
|
|
|
|
epoch + node.getStabilitySubnetLength()
|
|
|
|
|
|
|
|
result.incl node.attestationSubnets.stabilitySubnets[i].subnet
|
|
|
|
|
|
|
|
proc cycleAttestationSubnetsPerEpoch(
|
|
|
|
node: BeaconNode, wallSlot: Slot, prevStabilitySubnets: set[uint8]):
|
2021-01-25 17:39:56 +00:00
|
|
|
Future[set[uint8]] {.async.} =
|
2021-01-19 17:44:03 +00:00
|
|
|
# Per-epoch portion of subnet cycling: updating stability subnets and
|
|
|
|
# calculating future attestation subnets.
|
2020-09-15 12:40:43 +00:00
|
|
|
|
2020-12-22 09:05:36 +00:00
|
|
|
# Only know RANDAO mix, which determines shuffling seed, one epoch in
|
|
|
|
# advance. When node.chainDag.headState.data.data.slot.epoch is ahead
|
|
|
|
# of wallSlot, the clock's just incorrect. If the state slot's behind
|
|
|
|
# wallSlot, it would have to look more than MIN_SEED_LOOKAHEAD epochs
|
|
|
|
# ahead to compute the shuffling determining the beacon committees.
|
2021-01-25 17:39:56 +00:00
|
|
|
static: doAssert MIN_SEED_LOOKAHEAD == 1
|
2020-12-22 09:05:36 +00:00
|
|
|
if node.chainDag.headState.data.data.slot.epoch != wallSlot.epoch:
|
|
|
|
debug "Requested attestation subnets too far in advance",
|
|
|
|
wallSlot,
|
|
|
|
stateSlot = node.chainDag.headState.data.data.slot
|
2021-01-19 17:44:03 +00:00
|
|
|
return prevStabilitySubnets
|
2020-12-22 09:05:36 +00:00
|
|
|
|
|
|
|
# This works so long as at least one block in an epoch provides a basis for
|
|
|
|
# calculating the shuffling for the next epoch. It will keep checking for a
|
|
|
|
# block, each slot, until a block comes in, even if the first few blocks in
|
|
|
|
# an epoch are missing. If a whole epoch without blocks occurs, it's not as
|
|
|
|
# important to attest regardless, as those upcoming blocks will hit maximum
|
|
|
|
# attestations quickly and any individual attestation's likelihood of being
|
|
|
|
# selected is low.
|
2021-01-19 17:44:03 +00:00
|
|
|
if node.attestationSubnets.nextCycleEpoch <= wallSlot.epoch:
|
2021-01-25 17:39:56 +00:00
|
|
|
await node.updateSubscriptionSchedule(wallSlot.epoch + 1)
|
2021-01-19 17:44:03 +00:00
|
|
|
node.attestationSubnets.nextCycleEpoch = wallSlot.epoch + 1
|
2020-08-12 17:48:31 +00:00
|
|
|
|
2021-01-19 17:44:03 +00:00
|
|
|
let stabilitySubnets = node.updateStabilitySubnets(wallSlot)
|
|
|
|
|
|
|
|
if not node.config.subscribeAllSubnets and
|
|
|
|
stabilitySubnets != prevStabilitySubnets:
|
|
|
|
# In subscribeAllSubnets mode, this only gets set once, at initial subnet
|
|
|
|
# attestation handler creation, since they're all considered as stability
|
|
|
|
# subnets in that case.
|
|
|
|
node.updateStabilitySubnetMetadata(stabilitySubnets)
|
2020-08-12 17:48:31 +00:00
|
|
|
|
2021-01-25 17:39:56 +00:00
|
|
|
return stabilitySubnets
|
2020-12-18 08:50:29 +00:00
|
|
|
|
2021-01-25 17:39:56 +00:00
|
|
|
proc cycleAttestationSubnets(node: BeaconNode, wallSlot: Slot) {.async.} =
|
2021-01-19 17:44:03 +00:00
|
|
|
static: doAssert RANDOM_SUBNETS_PER_VALIDATOR == 1
|
|
|
|
doAssert not node.config.subscribeAllSubnets
|
2020-08-12 17:48:31 +00:00
|
|
|
|
2021-01-19 17:44:03 +00:00
|
|
|
let prevSubscribedSubnets = node.attestationSubnets.subscribedSubnets
|
2020-08-12 17:48:31 +00:00
|
|
|
|
2021-01-19 17:44:03 +00:00
|
|
|
for i in 0'u8 ..< ATTESTATION_SUBNET_COUNT:
|
|
|
|
if i in node.attestationSubnets.subscribedSubnets:
|
|
|
|
if wallSlot >= node.attestationSubnets.unsubscribeSlot[i]:
|
|
|
|
node.attestationSubnets.subscribedSubnets.excl i
|
|
|
|
else:
|
|
|
|
if wallSlot >= node.attestationSubnets.subscribeSlot[i]:
|
|
|
|
node.attestationSubnets.subscribedSubnets.incl i
|
2020-08-12 17:48:31 +00:00
|
|
|
|
2021-01-19 17:44:03 +00:00
|
|
|
let
|
|
|
|
prevStabilitySubnets =
|
2021-01-12 12:43:15 +00:00
|
|
|
getStabilitySubnets(node.attestationSubnets.stabilitySubnets)
|
2021-01-19 17:44:03 +00:00
|
|
|
stabilitySubnets =
|
2021-01-25 17:39:56 +00:00
|
|
|
await node.cycleAttestationSubnetsPerEpoch(wallSlot, prevStabilitySubnets)
|
2021-01-19 17:44:03 +00:00
|
|
|
|
|
|
|
# Accounting specific to non-stability subnets
|
|
|
|
for expiringSubnet in
|
|
|
|
prevSubscribedSubnets - node.attestationSubnets.subscribedSubnets:
|
|
|
|
node.attestationSubnets.subscribeSlot[expiringSubnet] = FAR_FUTURE_SLOT
|
2020-12-09 09:13:51 +00:00
|
|
|
|
2021-01-19 17:44:03 +00:00
|
|
|
let
|
|
|
|
prevAllSubnets = prevSubscribedSubnets + prevStabilitySubnets
|
|
|
|
allSubnets = node.attestationSubnets.subscribedSubnets + stabilitySubnets
|
|
|
|
unsubscribedSubnets = prevAllSubnets - allSubnets
|
|
|
|
subscribedSubnets = allSubnets - prevAllSubnets
|
|
|
|
|
|
|
|
for subnet in unsubscribedSubnets:
|
|
|
|
node.network.unsubscribe(
|
|
|
|
getAttestationTopic(node.forkDigest, subnet))
|
|
|
|
|
|
|
|
node.installAttestationSubnetHandlers(subscribedSubnets)
|
|
|
|
|
|
|
|
debug "Attestation subnets",
|
|
|
|
expiringSubnets =
|
|
|
|
prevSubscribedSubnets - node.attestationSubnets.subscribedSubnets,
|
|
|
|
subnets = node.attestationSubnets.subscribedSubnets,
|
|
|
|
newSubnets =
|
|
|
|
node.attestationSubnets.subscribedSubnets - prevSubscribedSubnets,
|
|
|
|
wallSlot,
|
|
|
|
wallEpoch = wallSlot.epoch,
|
|
|
|
num_stability_subnets = node.attestationSubnets.stabilitySubnets.len,
|
|
|
|
expiring_stability_subnets = prevStabilitySubnets - stabilitySubnets,
|
|
|
|
new_stability_subnets = stabilitySubnets - prevStabilitySubnets,
|
|
|
|
subscribedSubnets,
|
|
|
|
unsubscribedSubnets
|
|
|
|
|
|
|
|
proc getInitialAttestationSubnets(node: BeaconNode): Table[uint8, Slot] =
|
2021-01-14 08:43:21 +00:00
|
|
|
let
|
|
|
|
wallEpoch = node.beaconClock.now().slotOrZero().epoch
|
2021-01-26 11:52:00 +00:00
|
|
|
validatorIndices = toIntSet(toSeq(node.getAttachedValidators().keys()))
|
2021-01-25 17:39:56 +00:00
|
|
|
|
|
|
|
var cache = StateCache()
|
2021-01-14 08:43:21 +00:00
|
|
|
|
|
|
|
template mergeAttestationSubnets(epoch: Epoch) =
|
2021-02-14 15:37:32 +00:00
|
|
|
# TODO when https://github.com/nim-lang/Nim/issues/15972 and
|
|
|
|
# https://github.com/nim-lang/Nim/issues/16217 are fixed, in
|
|
|
|
# Nimbus's Nim, use (_, _, subnetIndex, slot).
|
2021-01-25 17:39:56 +00:00
|
|
|
for (_, ci, subnetIndex, slot) in get_committee_assignments(
|
|
|
|
node.chainDag.headState.data.data, epoch, validatorIndices, cache):
|
2021-01-19 17:44:03 +00:00
|
|
|
if subnetIndex in result:
|
|
|
|
result[subnetIndex] = max(result[subnetIndex], slot + 1)
|
|
|
|
else:
|
|
|
|
result[subnetIndex] = slot + 1
|
2021-01-14 08:43:21 +00:00
|
|
|
|
|
|
|
# Either wallEpoch is 0, in which case it might be pre-genesis, but we only
|
|
|
|
# care about the already-known first two epochs of attestations, or it's in
|
|
|
|
# epoch 0 for real, in which case both are also already known; or wallEpoch
|
|
|
|
# is greater than 0, in which case it's being called from onSlotStart which
|
|
|
|
# has enough state to calculate wallEpoch + {0,1}'s attestations.
|
|
|
|
mergeAttestationSubnets(wallEpoch)
|
|
|
|
mergeAttestationSubnets(wallEpoch + 1)
|
2020-08-19 12:42:10 +00:00
|
|
|
|
2021-01-14 08:43:21 +00:00
|
|
|
proc getAttestationSubnetHandlers(node: BeaconNode) =
|
2021-03-02 06:04:14 +00:00
|
|
|
# https://github.com/ethereum/eth2.0-specs/blob/v1.0.1/specs/phase0/validator.md#phase-0-attestation-subnet-stability
|
2020-12-18 08:50:29 +00:00
|
|
|
# TODO:
|
|
|
|
# We might want to reuse the previous stability subnet if not expired when:
|
|
|
|
# - Restarting the node with a presistent netkey
|
|
|
|
# - When going from synced -> syncing -> synced state
|
2021-01-14 08:43:21 +00:00
|
|
|
|
2021-01-19 17:44:03 +00:00
|
|
|
template getAllAttestationSubnets(): Table[uint8, Slot] =
|
|
|
|
var subnets: Table[uint8, Slot]
|
2021-01-14 08:43:21 +00:00
|
|
|
for i in 0'u8 ..< ATTESTATION_SUBNET_COUNT:
|
2021-01-19 17:44:03 +00:00
|
|
|
subnets[i] = FAR_FUTURE_SLOT
|
2021-01-14 08:43:21 +00:00
|
|
|
subnets
|
|
|
|
|
|
|
|
let
|
|
|
|
initialSubnets =
|
|
|
|
if node.config.subscribeAllSubnets:
|
|
|
|
getAllAttestationSubnets()
|
|
|
|
else:
|
|
|
|
node.getInitialAttestationSubnets()
|
|
|
|
wallEpoch = node.beaconClock.now().slotOrZero().epoch
|
|
|
|
|
|
|
|
var initialStabilitySubnets: set[uint8]
|
|
|
|
|
2020-12-22 09:05:36 +00:00
|
|
|
node.attestationSubnets.stabilitySubnets.setLen(
|
2021-02-22 16:17:48 +00:00
|
|
|
node.attachedValidators[].count)
|
|
|
|
for i in 0 ..< node.attachedValidators[].count:
|
2020-12-22 09:05:36 +00:00
|
|
|
node.attestationSubnets.stabilitySubnets[i] = (
|
2021-01-19 17:44:03 +00:00
|
|
|
subnet: node.network.rng[].rand(ATTESTATION_SUBNET_COUNT - 1).uint8,
|
|
|
|
expiration: wallEpoch + node.getStabilitySubnetLength())
|
2021-01-14 08:43:21 +00:00
|
|
|
initialStabilitySubnets.incl(
|
|
|
|
node.attestationSubnets.stabilitySubnets[i].subnet)
|
2020-08-19 12:42:10 +00:00
|
|
|
|
2020-12-22 09:05:36 +00:00
|
|
|
node.updateStabilitySubnetMetadata(
|
2021-01-12 12:43:15 +00:00
|
|
|
if node.config.subscribeAllSubnets:
|
2021-01-19 17:44:03 +00:00
|
|
|
{0'u8 .. (ATTESTATION_SUBNET_COUNT - 1)}
|
2021-01-12 12:43:15 +00:00
|
|
|
else:
|
|
|
|
node.attestationSubnets.stabilitySubnets.getStabilitySubnets)
|
2020-12-18 08:50:29 +00:00
|
|
|
|
2021-01-19 17:44:03 +00:00
|
|
|
for i in 0'u8 ..< ATTESTATION_SUBNET_COUNT:
|
|
|
|
if i in initialSubnets:
|
|
|
|
node.attestationSubnets.subscribedSubnets.incl i
|
|
|
|
node.attestationSubnets.unsubscribeSlot[i] = initialSubnets[i]
|
|
|
|
else:
|
|
|
|
node.attestationSubnets.subscribedSubnets.excl i
|
|
|
|
node.attestationSubnets.subscribeSlot[i] = FAR_FUTURE_SLOT
|
|
|
|
|
2020-12-22 09:05:36 +00:00
|
|
|
node.attestationSubnets.enabled = true
|
2020-08-19 12:42:10 +00:00
|
|
|
|
2020-12-22 09:05:36 +00:00
|
|
|
debug "Initial attestation subnets subscribed",
|
|
|
|
initialSubnets,
|
2021-01-14 08:43:21 +00:00
|
|
|
initialStabilitySubnets,
|
2020-12-22 09:05:36 +00:00
|
|
|
wallEpoch
|
2021-01-14 08:43:21 +00:00
|
|
|
node.installAttestationSubnetHandlers(
|
2021-01-19 17:44:03 +00:00
|
|
|
node.attestationSubnets.subscribedSubnets + initialStabilitySubnets)
|
2020-08-19 12:42:10 +00:00
|
|
|
|
2020-12-24 08:48:52 +00:00
|
|
|
proc addMessageHandlers(node: BeaconNode) =
|
2021-02-09 09:20:55 +00:00
|
|
|
# inspired by lighthouse research here
|
|
|
|
# https://gist.github.com/blacktemplar/5c1862cb3f0e32a1a7fb0b25e79e6e2c#file-generate-scoring-params-py
|
|
|
|
const
|
|
|
|
blocksTopicParams = TopicParams(
|
|
|
|
topicWeight: 0.5,
|
|
|
|
timeInMeshWeight: 0.03333333333333333,
|
|
|
|
timeInMeshQuantum: chronos.seconds(12),
|
|
|
|
timeInMeshCap: 300,
|
|
|
|
firstMessageDeliveriesWeight: 1.1471603557060206,
|
|
|
|
firstMessageDeliveriesDecay: 0.9928302477768374,
|
|
|
|
firstMessageDeliveriesCap: 34.86870846001471,
|
|
|
|
meshMessageDeliveriesWeight: -458.31054878249114,
|
|
|
|
meshMessageDeliveriesDecay: 0.9716279515771061,
|
|
|
|
meshMessageDeliveriesThreshold: 0.6849191409056553,
|
|
|
|
meshMessageDeliveriesCap: 2.054757422716966,
|
|
|
|
meshMessageDeliveriesActivation: chronos.seconds(384),
|
|
|
|
meshMessageDeliveriesWindow: chronos.seconds(2),
|
|
|
|
meshFailurePenaltyWeight: -458.31054878249114 ,
|
|
|
|
meshFailurePenaltyDecay: 0.9716279515771061,
|
|
|
|
invalidMessageDeliveriesWeight: -214.99999999999994,
|
|
|
|
invalidMessageDeliveriesDecay: 0.9971259067705325
|
|
|
|
)
|
|
|
|
aggregateTopicParams = TopicParams(
|
|
|
|
topicWeight: 0.5,
|
|
|
|
timeInMeshWeight: 0.03333333333333333,
|
|
|
|
timeInMeshQuantum: chronos.seconds(12),
|
|
|
|
timeInMeshCap: 300,
|
|
|
|
firstMessageDeliveriesWeight: 0.10764904539552399,
|
|
|
|
firstMessageDeliveriesDecay: 0.8659643233600653,
|
|
|
|
firstMessageDeliveriesCap: 371.5778421725158,
|
|
|
|
meshMessageDeliveriesWeight: -0.07538533073670682,
|
|
|
|
meshMessageDeliveriesDecay: 0.930572040929699,
|
|
|
|
meshMessageDeliveriesThreshold: 53.404248450179836,
|
|
|
|
meshMessageDeliveriesCap: 213.61699380071934,
|
|
|
|
meshMessageDeliveriesActivation: chronos.seconds(384),
|
|
|
|
meshMessageDeliveriesWindow: chronos.seconds(2),
|
|
|
|
meshFailurePenaltyWeight: -0.07538533073670682 ,
|
|
|
|
meshFailurePenaltyDecay: 0.930572040929699,
|
|
|
|
invalidMessageDeliveriesWeight: -214.99999999999994,
|
|
|
|
invalidMessageDeliveriesDecay: 0.9971259067705325
|
|
|
|
)
|
|
|
|
basicParams = TopicParams.init()
|
|
|
|
|
|
|
|
static:
|
|
|
|
# compile time validation
|
|
|
|
blocksTopicParams.validateParameters().tryGet()
|
|
|
|
aggregateTopicParams.validateParameters().tryGet()
|
|
|
|
basicParams.validateParameters.tryGet()
|
|
|
|
|
|
|
|
node.network.subscribe(node.topicBeaconBlocks, blocksTopicParams, enableTopicMetrics = true)
|
|
|
|
node.network.subscribe(getAttesterSlashingsTopic(node.forkDigest), basicParams)
|
|
|
|
node.network.subscribe(getProposerSlashingsTopic(node.forkDigest), basicParams)
|
|
|
|
node.network.subscribe(getVoluntaryExitsTopic(node.forkDigest), basicParams)
|
|
|
|
node.network.subscribe(getAggregateAndProofsTopic(node.forkDigest), aggregateTopicParams, enableTopicMetrics = true)
|
2020-12-24 08:48:52 +00:00
|
|
|
node.getAttestationSubnetHandlers()
|
|
|
|
|
2020-09-15 12:40:43 +00:00
|
|
|
func getTopicSubscriptionEnabled(node: BeaconNode): bool =
|
2020-12-22 09:05:36 +00:00
|
|
|
node.attestationSubnets.enabled
|
2020-09-15 12:40:43 +00:00
|
|
|
|
2020-12-24 08:48:52 +00:00
|
|
|
proc removeMessageHandlers(node: BeaconNode) =
|
2020-12-22 09:05:36 +00:00
|
|
|
node.attestationSubnets.enabled = false
|
2020-09-15 12:40:43 +00:00
|
|
|
doAssert not node.getTopicSubscriptionEnabled()
|
|
|
|
|
2020-12-24 08:48:52 +00:00
|
|
|
node.network.unsubscribe(getBeaconBlocksTopic(node.forkDigest))
|
|
|
|
node.network.unsubscribe(getVoluntaryExitsTopic(node.forkDigest))
|
|
|
|
node.network.unsubscribe(getProposerSlashingsTopic(node.forkDigest))
|
|
|
|
node.network.unsubscribe(getAttesterSlashingsTopic(node.forkDigest))
|
|
|
|
node.network.unsubscribe(getAggregateAndProofsTopic(node.forkDigest))
|
2020-09-15 12:40:43 +00:00
|
|
|
|
|
|
|
for subnet in 0'u64 ..< ATTESTATION_SUBNET_COUNT:
|
2020-12-24 08:48:52 +00:00
|
|
|
node.network.unsubscribe(getAttestationTopic(node.forkDigest, subnet))
|
2020-09-15 12:40:43 +00:00
|
|
|
|
2021-02-01 11:18:16 +00:00
|
|
|
proc setupDoppelgangerDetection(node: BeaconNode, slot: Slot) =
|
2020-10-27 17:21:35 +00:00
|
|
|
# When another client's already running, this is very likely to detect
|
2021-01-29 12:38:52 +00:00
|
|
|
# potential duplicate validators, which can trigger slashing.
|
2020-10-27 17:21:35 +00:00
|
|
|
#
|
|
|
|
# Every missed attestation costs approximately 3*get_base_reward(), which
|
|
|
|
# can be up to around 10,000 Wei. Thus, skipping attestations isn't cheap
|
|
|
|
# and one should gauge the likelihood of this simultaneous launch to tune
|
|
|
|
# the epoch delay to one's perceived risk.
|
|
|
|
const duplicateValidatorEpochs = 2
|
|
|
|
|
2021-02-01 11:18:16 +00:00
|
|
|
node.processor.doppelgangerDetection.broadcastStartEpoch =
|
2020-10-27 17:21:35 +00:00
|
|
|
slot.epoch + duplicateValidatorEpochs
|
2021-01-29 12:38:52 +00:00
|
|
|
debug "Setting up doppelganger protection",
|
2020-10-27 17:21:35 +00:00
|
|
|
epoch = slot.epoch,
|
|
|
|
broadcastStartEpoch =
|
2021-02-01 11:18:16 +00:00
|
|
|
node.processor.doppelgangerDetection.broadcastStartEpoch
|
2020-10-27 17:21:35 +00:00
|
|
|
|
2020-12-24 08:48:52 +00:00
|
|
|
proc updateGossipStatus(node: BeaconNode, slot: Slot) =
|
2020-12-01 10:43:02 +00:00
|
|
|
# Syncing tends to be ~1 block/s, and allow for an epoch of time for libp2p
|
|
|
|
# subscribing to spin up. The faster the sync, the more wallSlot - headSlot
|
|
|
|
# lead time is required
|
|
|
|
const
|
|
|
|
TOPIC_SUBSCRIBE_THRESHOLD_SLOTS = 64
|
|
|
|
HYSTERESIS_BUFFER = 16
|
|
|
|
|
|
|
|
let
|
|
|
|
syncQueueLen = node.syncManager.syncQueueLen
|
|
|
|
topicSubscriptionEnabled = node.getTopicSubscriptionEnabled()
|
|
|
|
if
|
|
|
|
# Don't enable if already enabled; to avoid race conditions requires care,
|
|
|
|
# but isn't crucial, as this condition spuriously fail, but the next time,
|
|
|
|
# should properly succeed.
|
|
|
|
not topicSubscriptionEnabled and
|
|
|
|
# SyncManager forward sync by default runs until maxHeadAge slots, or one
|
|
|
|
# epoch range is achieved. This particular condition has a couple caveats
|
|
|
|
# including that under certain conditions, debtsCount appears to push len
|
|
|
|
# (here, syncQueueLen) to underflow-like values; and even when exactly at
|
|
|
|
# the expected walltime slot the queue isn't necessarily empty. Therefore
|
|
|
|
# TOPIC_SUBSCRIBE_THRESHOLD_SLOTS is not exactly the number of slots that
|
|
|
|
# are left. Furthermore, even when 0 peers are being used, this won't get
|
|
|
|
# to 0 slots in syncQueueLen, but that's a vacuous condition given that a
|
|
|
|
# networking interaction cannot happen under such circumstances.
|
|
|
|
syncQueueLen < TOPIC_SUBSCRIBE_THRESHOLD_SLOTS:
|
|
|
|
# When node.cycleAttestationSubnets() is enabled more properly, integrate
|
|
|
|
# this into the node.cycleAttestationSubnets() call.
|
|
|
|
debug "Enabling topic subscriptions",
|
|
|
|
wallSlot = slot,
|
|
|
|
headSlot = node.chainDag.head.slot,
|
|
|
|
syncQueueLen
|
|
|
|
|
2021-02-01 11:18:16 +00:00
|
|
|
node.setupDoppelgangerDetection(slot)
|
2020-12-24 08:48:52 +00:00
|
|
|
node.addMessageHandlers()
|
2020-12-01 10:43:02 +00:00
|
|
|
doAssert node.getTopicSubscriptionEnabled()
|
|
|
|
elif
|
|
|
|
topicSubscriptionEnabled and
|
|
|
|
syncQueueLen > TOPIC_SUBSCRIBE_THRESHOLD_SLOTS + HYSTERESIS_BUFFER and
|
|
|
|
# Filter out underflow from debtsCount; plausible queue lengths can't
|
|
|
|
# exceed wallslot, with safety margin.
|
|
|
|
syncQueueLen < 2 * slot.uint64:
|
|
|
|
debug "Disabling topic subscriptions",
|
|
|
|
wallSlot = slot,
|
|
|
|
headSlot = node.chainDag.head.slot,
|
|
|
|
syncQueueLen
|
2020-12-24 08:48:52 +00:00
|
|
|
node.removeMessageHandlers()
|
2020-12-01 10:43:02 +00:00
|
|
|
|
2021-01-12 12:43:15 +00:00
|
|
|
# Subscription or unsubscription might have occurred; recheck. Since Nimbus
|
|
|
|
# initially subscribes to all subnets, simply do not ever cycle attestation
|
|
|
|
# subnets and they'll all remain subscribed.
|
|
|
|
if node.getTopicSubscriptionEnabled and not node.config.subscribeAllSubnets:
|
2020-12-22 09:05:36 +00:00
|
|
|
# This exits early all but one call each epoch.
|
2021-01-25 17:39:56 +00:00
|
|
|
traceAsyncErrors node.cycleAttestationSubnets(slot)
|
2020-12-01 10:43:02 +00:00
|
|
|
|
2021-02-14 15:37:32 +00:00
|
|
|
func getNextAttestation(node: BeaconNode, slot: Slot): Slot =
|
|
|
|
# The relevant attestations are in, depending on calculated bounds:
|
|
|
|
# [aS[epoch mod 2], aS[1 - (epoch mod 2)]]
|
|
|
|
# current epoch next epoch
|
|
|
|
let orderedAttestingSlots = [
|
|
|
|
node.attestationSubnets.attestingSlots[ slot.epoch mod 2'u64],
|
|
|
|
node.attestationSubnets.attestingSlots[1 - (slot.epoch mod 2'u64)]]
|
|
|
|
|
|
|
|
static: doAssert MIN_ATTESTATION_INCLUSION_DELAY == 1
|
|
|
|
|
|
|
|
# Cleverer ways exist, but a short loop is fine. O(n) vs O(log n) isn't that
|
|
|
|
# important when n is 32 or 64, with early exit on average no more than half
|
|
|
|
# through.
|
|
|
|
for i in [0'u64, 1'u64]:
|
|
|
|
let bitmapEpoch = slot.epoch + i
|
|
|
|
|
|
|
|
if bitmapEpoch > node.attestationSubnets.lastCalculatedAttestationEpoch:
|
|
|
|
return FAR_FUTURE_SLOT
|
|
|
|
|
|
|
|
for slotOffset in 0 ..< SLOTS_PER_EPOCH:
|
|
|
|
let nextAttestationSlot =
|
|
|
|
compute_start_slot_at_epoch(bitmapEpoch) + slotOffset
|
|
|
|
if ((orderedAttestingSlots[i] and (1'u32 shl slotOffset)) != 0) and
|
|
|
|
nextAttestationSlot > slot:
|
|
|
|
return nextAttestationSlot
|
|
|
|
|
|
|
|
FAR_FUTURE_SLOT
|
|
|
|
|
|
|
|
proc onSlotEnd(node: BeaconNode, slot: Slot) {.async.} =
|
2020-12-18 21:01:24 +00:00
|
|
|
# Things we do when slot processing has ended and we're about to wait for the
|
|
|
|
# next slot
|
|
|
|
|
2021-03-09 14:36:17 +00:00
|
|
|
# Delay part of pruning until latency critical duties are done.
|
|
|
|
# The other part of pruning, `pruneBlocksDAG`, is done eagerly.
|
2021-03-11 10:10:57 +00:00
|
|
|
node.consensusManager[].pruneStateCachesAndForkChoice()
|
2021-03-09 14:36:17 +00:00
|
|
|
|
2020-12-18 21:01:24 +00:00
|
|
|
when declared(GC_fullCollect):
|
|
|
|
# The slots in the beacon node work as frames in a game: we want to make
|
|
|
|
# sure that we're ready for the next one and don't get stuck in lengthy
|
|
|
|
# garbage collection tasks when time is of essence in the middle of a slot -
|
|
|
|
# while this does not guarantee that we'll never collect during a slot, it
|
|
|
|
# makes sure that all the scratch space we used during slot tasks (logging,
|
|
|
|
# temporary buffers etc) gets recycled for the next slot that is likely to
|
|
|
|
# need similar amounts of memory.
|
|
|
|
GC_fullCollect()
|
|
|
|
|
|
|
|
# Checkpoint the database to clear the WAL file and make sure changes in
|
|
|
|
# the database are synced with the filesystem.
|
2021-01-18 10:02:56 +00:00
|
|
|
node.db.checkpoint()
|
2020-12-18 21:01:24 +00:00
|
|
|
|
2021-02-14 15:37:32 +00:00
|
|
|
let
|
|
|
|
horizonSlot = compute_start_slot_at_epoch(
|
|
|
|
node.attestationSubnets.lastCalculatedAttestationEpoch + 1) - 1
|
|
|
|
nextAttestationSlot = node.getNextAttestation(slot)
|
2021-03-12 09:46:26 +00:00
|
|
|
nextActionWaitTime =
|
|
|
|
saturate(fromNow(node.beaconClock, nextAttestationSlot))
|
2021-02-14 15:37:32 +00:00
|
|
|
horizonDistance = saturate(fromNow(node.beaconClock, horizonSlot))
|
|
|
|
|
2020-12-18 21:01:24 +00:00
|
|
|
info "Slot end",
|
|
|
|
slot = shortLog(slot),
|
2021-02-14 15:37:32 +00:00
|
|
|
nextSlot = shortLog(slot + 1),
|
2020-12-18 21:01:24 +00:00
|
|
|
head = shortLog(node.chainDag.head),
|
|
|
|
headEpoch = shortLog(node.chainDag.head.slot.compute_epoch_at_slot()),
|
|
|
|
finalizedHead = shortLog(node.chainDag.finalizedHead.blck),
|
2021-02-14 15:37:32 +00:00
|
|
|
finalizedEpoch =
|
|
|
|
shortLog(node.chainDag.finalizedHead.blck.slot.compute_epoch_at_slot()),
|
|
|
|
nextAttestationSlot,
|
|
|
|
nextActionWait =
|
|
|
|
if nextAttestationSlot == FAR_FUTURE_SLOT:
|
|
|
|
"n/a"
|
|
|
|
else:
|
2021-03-12 09:46:26 +00:00
|
|
|
shortLog(nextActionWaitTime),
|
2021-02-14 15:37:32 +00:00
|
|
|
lookaheadTime = shortLog(horizonDistance)
|
2020-12-18 21:01:24 +00:00
|
|
|
|
2021-03-12 09:46:26 +00:00
|
|
|
if nextAttestationSlot != FAR_FUTURE_SLOT:
|
|
|
|
next_action_wait.set(nextActionWaitTime.toFloatSeconds)
|
|
|
|
|
2020-12-18 21:01:24 +00:00
|
|
|
node.updateGossipStatus(slot)
|
|
|
|
|
2021-03-01 16:36:06 +00:00
|
|
|
proc onSlotStart(
|
|
|
|
node: BeaconNode, wallTime: BeaconTime, lastSlot: Slot) {.async.} =
|
2019-03-22 15:49:37 +00:00
|
|
|
## Called at the beginning of a slot - usually every slot, but sometimes might
|
|
|
|
## skip a few in case we're running late.
|
2021-03-01 16:36:06 +00:00
|
|
|
## wallTime: current system time - we will strive to perform all duties up
|
|
|
|
## to this point in time
|
2020-06-26 13:51:20 +00:00
|
|
|
## lastSlot: the last slot that we successfully processed, so we know where to
|
2021-03-01 16:36:06 +00:00
|
|
|
## start work from - there might be jumps if processing is delayed
|
2019-03-22 15:49:37 +00:00
|
|
|
let
|
|
|
|
# The slot we should be at, according to the clock
|
2021-03-01 16:36:06 +00:00
|
|
|
wallSlot = wallTime.slotOrZero
|
|
|
|
# If everything was working perfectly, the slot that we should be processing
|
|
|
|
expectedSlot = lastSlot + 1
|
2020-07-30 14:27:34 +00:00
|
|
|
finalizedEpoch =
|
2020-07-30 19:18:17 +00:00
|
|
|
node.chainDag.finalizedHead.blck.slot.compute_epoch_at_slot()
|
2021-03-01 16:36:06 +00:00
|
|
|
delay = wallTime - expectedSlot.toBeaconTime()
|
2020-12-18 21:01:24 +00:00
|
|
|
|
2019-12-23 15:34:09 +00:00
|
|
|
info "Slot start",
|
2019-08-15 16:01:55 +00:00
|
|
|
lastSlot = shortLog(lastSlot),
|
2021-03-01 16:36:06 +00:00
|
|
|
wallSlot = shortLog(wallSlot),
|
|
|
|
delay = shortLog(delay),
|
2020-09-21 16:02:27 +00:00
|
|
|
peers = len(node.network.peerPool),
|
2020-07-30 19:18:17 +00:00
|
|
|
head = shortLog(node.chainDag.head),
|
|
|
|
headEpoch = shortLog(node.chainDag.head.slot.compute_epoch_at_slot()),
|
|
|
|
finalized = shortLog(node.chainDag.finalizedHead.blck),
|
2020-12-18 21:01:24 +00:00
|
|
|
finalizedEpoch = shortLog(finalizedEpoch),
|
|
|
|
sync =
|
|
|
|
if node.syncManager.inProgress: node.syncManager.syncStatus
|
|
|
|
else: "synced"
|
2019-03-22 15:49:37 +00:00
|
|
|
|
2020-02-17 18:24:14 +00:00
|
|
|
# Check before any re-scheduling of onSlotStart()
|
2021-03-01 16:36:06 +00:00
|
|
|
checkIfShouldStopAtEpoch(wallSlot, node.config.stopAtEpoch)
|
2020-02-17 18:24:14 +00:00
|
|
|
|
2021-03-01 19:55:25 +00:00
|
|
|
beacon_slot.set wallSlot.toGaugeValue
|
|
|
|
beacon_current_epoch.set wallSlot.epoch.toGaugeValue
|
2019-12-23 15:34:09 +00:00
|
|
|
|
2021-03-01 19:55:25 +00:00
|
|
|
# both non-negative, so difference can't overflow or underflow int64
|
|
|
|
finalization_delay.set(
|
|
|
|
wallSlot.epoch.toGaugeValue - finalizedEpoch.toGaugeValue)
|
2019-03-22 15:49:37 +00:00
|
|
|
|
2021-03-01 16:36:06 +00:00
|
|
|
if node.config.verifyFinalization:
|
|
|
|
verifyFinalization(node, wallSlot)
|
2019-03-22 15:49:37 +00:00
|
|
|
|
2021-03-11 10:10:57 +00:00
|
|
|
node.consensusManager[].updateHead(wallSlot)
|
2019-03-22 15:49:37 +00:00
|
|
|
|
2021-03-01 16:36:06 +00:00
|
|
|
await node.handleValidatorDuties(lastSlot, wallSlot)
|
2019-08-16 11:16:56 +00:00
|
|
|
|
2021-03-01 16:36:06 +00:00
|
|
|
await onSlotEnd(node, wallSlot)
|
2020-12-08 17:11:54 +00:00
|
|
|
|
2021-03-01 16:36:06 +00:00
|
|
|
proc runSlotLoop(node: BeaconNode, startTime: BeaconTime) {.async.} =
|
|
|
|
var
|
|
|
|
curSlot = startTime.slotOrZero()
|
|
|
|
nextSlot = curSlot + 1 # No earlier than GENESIS_SLOT + 1
|
|
|
|
timeToNextSlot = nextSlot.toBeaconTime() - startTime
|
2020-11-27 22:16:13 +00:00
|
|
|
|
2021-03-01 16:36:06 +00:00
|
|
|
info "Scheduling first slot action",
|
|
|
|
startTime = shortLog(startTime),
|
|
|
|
nextSlot = shortLog(nextSlot),
|
|
|
|
timeToNextSlot = shortLog(timeToNextSlot)
|
2019-09-07 17:48:05 +00:00
|
|
|
|
2021-03-01 16:36:06 +00:00
|
|
|
while true:
|
|
|
|
# Start by waiting for the time when the slot starts. Sleeping relinquishes
|
|
|
|
# control to other tasks which may or may not finish within the alotted
|
|
|
|
# time, so below, we need to be wary that the ship might have sailed
|
|
|
|
# already.
|
|
|
|
await sleepAsync(timeToNextSlot)
|
2019-03-22 15:49:37 +00:00
|
|
|
|
2021-03-01 16:36:06 +00:00
|
|
|
let
|
|
|
|
wallTime = node.beaconClock.now()
|
|
|
|
wallSlot = wallTime.slotOrZero() # Always > GENESIS!
|
|
|
|
|
|
|
|
if wallSlot < nextSlot:
|
|
|
|
# While we were sleeping, the system clock changed and time moved
|
|
|
|
# backwards!
|
|
|
|
if wallSlot + 1 < nextSlot:
|
|
|
|
# This is a critical condition where it's hard to reason about what
|
|
|
|
# to do next - we'll call the attention of the user here by shutting
|
|
|
|
# down.
|
|
|
|
fatal "System time adjusted backwards significantly - clock may be inaccurate - shutting down",
|
|
|
|
nextSlot = shortLog(nextSlot),
|
|
|
|
wallSlot = shortLog(wallSlot)
|
|
|
|
bnStatus = BeaconNodeStatus.Stopping
|
|
|
|
return
|
|
|
|
|
|
|
|
# Time moved back by a single slot - this could be a minor adjustment,
|
|
|
|
# for example when NTP does its thing after not working for a while
|
|
|
|
warn "System time adjusted backwards, rescheduling slot actions",
|
|
|
|
wallTime = shortLog(wallTime),
|
|
|
|
nextSlot = shortLog(nextSlot),
|
|
|
|
wallSlot = shortLog(wallSlot)
|
|
|
|
|
|
|
|
# cur & next slot remain the same
|
|
|
|
timeToNextSlot = nextSlot.toBeaconTime() - wallTime
|
|
|
|
continue
|
|
|
|
|
|
|
|
if wallSlot > nextSlot + SLOTS_PER_EPOCH:
|
|
|
|
# Time moved forwards by more than an epoch - either the clock was reset
|
|
|
|
# or we've been stuck in processing for a long time - either way, we will
|
|
|
|
# skip ahead so that we only process the events of the last
|
|
|
|
# SLOTS_PER_EPOCH slots
|
|
|
|
warn "Time moved forwards by more than an epoch, skipping ahead",
|
|
|
|
curSlot = shortLog(curSlot),
|
|
|
|
nextSlot = shortLog(nextSlot),
|
|
|
|
wallSlot = shortLog(wallSlot)
|
|
|
|
|
|
|
|
curSlot = wallSlot - SLOTS_PER_EPOCH
|
|
|
|
|
|
|
|
elif wallSlot > nextSlot:
|
|
|
|
notice "Missed expected slot start, catching up",
|
|
|
|
delay = shortLog(wallTime - nextSlot.toBeaconTime()),
|
|
|
|
curSlot = shortLog(curSlot),
|
|
|
|
nextSlot = shortLog(curSlot)
|
|
|
|
|
|
|
|
await onSlotStart(node, wallTime, curSlot)
|
2019-03-22 15:49:37 +00:00
|
|
|
|
2021-03-01 16:36:06 +00:00
|
|
|
curSlot = wallSlot
|
|
|
|
nextSlot = wallSlot + 1
|
|
|
|
timeToNextSlot = saturate(node.beaconClock.fromNow(nextSlot))
|
2019-03-22 15:49:37 +00:00
|
|
|
|
2019-12-02 14:42:57 +00:00
|
|
|
proc handleMissingBlocks(node: BeaconNode) =
|
2020-07-30 19:18:17 +00:00
|
|
|
let missingBlocks = node.quarantine.checkMissing()
|
2019-03-28 14:03:19 +00:00
|
|
|
if missingBlocks.len > 0:
|
2020-10-01 18:56:42 +00:00
|
|
|
debug "Requesting detected missing blocks", blocks = shortLog(missingBlocks)
|
2020-06-18 10:03:36 +00:00
|
|
|
node.requestManager.fetchAncestorBlocks(missingBlocks)
|
2019-12-02 14:42:57 +00:00
|
|
|
|
2020-08-10 18:49:45 +00:00
|
|
|
proc onSecond(node: BeaconNode) =
|
2020-06-03 08:46:29 +00:00
|
|
|
## This procedure will be called once per second.
|
|
|
|
if not(node.syncManager.inProgress):
|
|
|
|
node.handleMissingBlocks()
|
|
|
|
|
|
|
|
proc runOnSecondLoop(node: BeaconNode) {.async.} =
|
2020-08-10 18:49:45 +00:00
|
|
|
let sleepTime = chronos.seconds(1)
|
|
|
|
const nanosecondsIn1s = float(chronos.seconds(1).nanoseconds)
|
2020-06-03 08:46:29 +00:00
|
|
|
while true:
|
|
|
|
let start = chronos.now(chronos.Moment)
|
2020-08-10 18:49:45 +00:00
|
|
|
await chronos.sleepAsync(sleepTime)
|
|
|
|
let afterSleep = chronos.now(chronos.Moment)
|
|
|
|
let sleepTime = afterSleep - start
|
|
|
|
node.onSecond()
|
|
|
|
let finished = chronos.now(chronos.Moment)
|
|
|
|
let processingTime = finished - afterSleep
|
|
|
|
ticks_delay.set(sleepTime.nanoseconds.float / nanosecondsIn1s)
|
2020-10-01 18:56:42 +00:00
|
|
|
trace "onSecond task completed", sleepTime, processingTime
|
2019-03-27 20:17:01 +00:00
|
|
|
|
2020-08-12 09:29:11 +00:00
|
|
|
proc startSyncManager(node: BeaconNode) =
|
2020-06-30 13:53:57 +00:00
|
|
|
func getLocalHeadSlot(): Slot =
|
2020-08-12 09:29:11 +00:00
|
|
|
node.chainDag.head.slot
|
2020-04-20 14:59:18 +00:00
|
|
|
|
2020-09-14 14:50:03 +00:00
|
|
|
proc getLocalWallSlot(): Slot =
|
2020-10-30 12:33:52 +00:00
|
|
|
node.beaconClock.now().slotOrZero
|
2020-04-20 14:59:18 +00:00
|
|
|
|
2020-09-14 14:50:03 +00:00
|
|
|
func getFirstSlotAtFinalizedEpoch(): Slot =
|
2020-09-22 20:42:42 +00:00
|
|
|
node.chainDag.finalizedHead.slot
|
2020-06-11 14:20:53 +00:00
|
|
|
|
2020-04-23 15:31:00 +00:00
|
|
|
proc scoreCheck(peer: Peer): bool =
|
2020-05-28 05:02:28 +00:00
|
|
|
if peer.score < PeerScoreLowLimit:
|
2020-08-12 09:29:11 +00:00
|
|
|
false
|
2020-04-23 15:31:00 +00:00
|
|
|
else:
|
2020-08-12 09:29:11 +00:00
|
|
|
true
|
2020-04-23 15:31:00 +00:00
|
|
|
|
2020-10-27 09:25:28 +00:00
|
|
|
proc onDeletePeer(peer: Peer) =
|
|
|
|
if peer.connectionState notin {Disconnecting, Disconnected}:
|
|
|
|
if peer.score < PeerScoreLowLimit:
|
|
|
|
debug "Peer was removed from PeerPool due to low score", peer = peer,
|
|
|
|
peer_score = peer.score, score_low_limit = PeerScoreLowLimit,
|
|
|
|
score_high_limit = PeerScoreHighLimit
|
|
|
|
asyncSpawn peer.disconnect(PeerScoreLow)
|
|
|
|
else:
|
|
|
|
debug "Peer was removed from PeerPool", peer = peer,
|
|
|
|
peer_score = peer.score, score_low_limit = PeerScoreLowLimit,
|
|
|
|
score_high_limit = PeerScoreHighLimit
|
|
|
|
asyncSpawn peer.disconnect(FaultOrError)
|
|
|
|
|
2020-04-23 15:31:00 +00:00
|
|
|
node.network.peerPool.setScoreCheck(scoreCheck)
|
2020-10-27 09:25:28 +00:00
|
|
|
node.network.peerPool.setOnDeletePeer(onDeletePeer)
|
2020-04-23 15:31:00 +00:00
|
|
|
|
2020-06-03 08:46:29 +00:00
|
|
|
node.syncManager = newSyncManager[Peer, PeerID](
|
2020-04-20 14:59:18 +00:00
|
|
|
node.network.peerPool, getLocalHeadSlot, getLocalWallSlot,
|
2021-03-11 10:10:57 +00:00
|
|
|
getFirstSlotAtFinalizedEpoch, node.verifQueues, chunkSize = 32
|
2020-04-20 14:59:18 +00:00
|
|
|
)
|
2020-08-10 07:15:50 +00:00
|
|
|
node.syncManager.start()
|
|
|
|
|
2020-03-16 22:28:54 +00:00
|
|
|
proc connectedPeersCount(node: BeaconNode): int =
|
2020-09-14 14:50:03 +00:00
|
|
|
len(node.network.peerPool)
|
2020-03-16 22:28:54 +00:00
|
|
|
|
|
|
|
proc installRpcHandlers(rpcServer: RpcServer, node: BeaconNode) =
|
|
|
|
rpcServer.installBeaconApiHandlers(node)
|
2020-10-27 09:00:57 +00:00
|
|
|
rpcServer.installConfigApiHandlers(node)
|
2020-03-16 22:28:54 +00:00
|
|
|
rpcServer.installDebugApiHandlers(node)
|
2020-10-27 09:00:57 +00:00
|
|
|
rpcServer.installEventApiHandlers(node)
|
|
|
|
rpcServer.installNimbusApiHandlers(node)
|
|
|
|
rpcServer.installNodeApiHandlers(node)
|
|
|
|
rpcServer.installValidatorApiHandlers(node)
|
2020-03-16 22:28:54 +00:00
|
|
|
|
2020-08-17 12:07:29 +00:00
|
|
|
proc installMessageValidators(node: BeaconNode) =
|
2021-03-02 06:04:14 +00:00
|
|
|
# https://github.com/ethereum/eth2.0-specs/blob/v1.0.1/specs/phase0/p2p-interface.md#attestations-and-aggregation
|
2020-08-12 17:48:31 +00:00
|
|
|
# These validators stay around the whole time, regardless of which specific
|
|
|
|
# subnets are subscribed to during any given epoch.
|
2020-03-31 18:39:02 +00:00
|
|
|
for it in 0'u64 ..< ATTESTATION_SUBNET_COUNT.uint64:
|
|
|
|
closureScope:
|
|
|
|
let ci = it
|
2020-08-12 17:48:31 +00:00
|
|
|
node.network.addValidator(
|
2020-08-04 22:43:54 +00:00
|
|
|
getAttestationTopic(node.forkDigest, ci),
|
2020-06-29 18:08:58 +00:00
|
|
|
# This proc needs to be within closureScope; don't lift out of loop.
|
2020-09-18 11:53:09 +00:00
|
|
|
proc(attestation: Attestation): ValidationResult =
|
2020-08-20 16:30:47 +00:00
|
|
|
node.processor[].attestationValidator(attestation, ci))
|
2020-08-12 17:48:31 +00:00
|
|
|
|
2020-08-17 12:07:29 +00:00
|
|
|
node.network.addValidator(
|
|
|
|
getAggregateAndProofsTopic(node.forkDigest),
|
2020-09-18 11:53:09 +00:00
|
|
|
proc(signedAggregateAndProof: SignedAggregateAndProof): ValidationResult =
|
2020-08-20 16:30:47 +00:00
|
|
|
node.processor[].aggregateValidator(signedAggregateAndProof))
|
2020-08-17 12:07:29 +00:00
|
|
|
|
2020-08-20 16:30:47 +00:00
|
|
|
node.network.addValidator(
|
|
|
|
node.topicBeaconBlocks,
|
2020-09-18 11:53:09 +00:00
|
|
|
proc (signedBlock: SignedBeaconBlock): ValidationResult =
|
2020-08-20 16:30:47 +00:00
|
|
|
node.processor[].blockValidator(signedBlock))
|
2020-08-17 12:07:29 +00:00
|
|
|
|
2020-09-14 14:26:31 +00:00
|
|
|
node.network.addValidator(
|
|
|
|
getAttesterSlashingsTopic(node.forkDigest),
|
2020-09-18 11:53:09 +00:00
|
|
|
proc (attesterSlashing: AttesterSlashing): ValidationResult =
|
2020-09-14 14:26:31 +00:00
|
|
|
node.processor[].attesterSlashingValidator(attesterSlashing))
|
|
|
|
|
|
|
|
node.network.addValidator(
|
|
|
|
getProposerSlashingsTopic(node.forkDigest),
|
2020-09-18 11:53:09 +00:00
|
|
|
proc (proposerSlashing: ProposerSlashing): ValidationResult =
|
2020-09-14 14:26:31 +00:00
|
|
|
node.processor[].proposerSlashingValidator(proposerSlashing))
|
|
|
|
|
|
|
|
node.network.addValidator(
|
|
|
|
getVoluntaryExitsTopic(node.forkDigest),
|
2020-09-24 17:05:49 +00:00
|
|
|
proc (signedVoluntaryExit: SignedVoluntaryExit): ValidationResult =
|
|
|
|
node.processor[].voluntaryExitValidator(signedVoluntaryExit))
|
2020-09-14 14:26:31 +00:00
|
|
|
|
2020-05-19 18:57:35 +00:00
|
|
|
proc stop*(node: BeaconNode) =
|
2020-09-28 15:19:57 +00:00
|
|
|
bnStatus = BeaconNodeStatus.Stopping
|
2020-10-01 18:56:42 +00:00
|
|
|
notice "Graceful shutdown"
|
2020-09-01 13:44:40 +00:00
|
|
|
if not node.config.inProcessValidators:
|
|
|
|
node.vcProcess.close()
|
2020-05-19 18:57:35 +00:00
|
|
|
waitFor node.network.stop()
|
2020-11-20 13:23:55 +00:00
|
|
|
node.attachedValidators.slashingProtection.close()
|
2020-09-12 05:35:58 +00:00
|
|
|
node.db.close()
|
2020-11-20 13:23:55 +00:00
|
|
|
notice "Databases closed"
|
2020-05-19 18:57:35 +00:00
|
|
|
|
2020-05-14 11:19:10 +00:00
|
|
|
proc run*(node: BeaconNode) =
|
2020-09-28 15:19:57 +00:00
|
|
|
if bnStatus == BeaconNodeStatus.Starting:
|
2020-05-19 18:57:35 +00:00
|
|
|
# it might have been set to "Stopping" with Ctrl+C
|
2020-09-28 15:19:57 +00:00
|
|
|
bnStatus = BeaconNodeStatus.Running
|
2020-05-19 18:57:35 +00:00
|
|
|
|
|
|
|
if node.rpcServer != nil:
|
|
|
|
node.rpcServer.installRpcHandlers(node)
|
|
|
|
node.rpcServer.start()
|
|
|
|
|
2020-08-17 12:07:29 +00:00
|
|
|
node.installMessageValidators()
|
2020-05-14 11:19:10 +00:00
|
|
|
|
2021-03-01 16:36:06 +00:00
|
|
|
let startTime = node.beaconClock.now()
|
|
|
|
asyncSpawn runSlotLoop(node, startTime)
|
|
|
|
asyncSpawn runOnSecondLoop(node)
|
2021-03-11 10:10:57 +00:00
|
|
|
asyncSpawn runQueueProcessingLoop(node.verifQueues)
|
2019-03-27 20:17:01 +00:00
|
|
|
|
2020-06-18 10:03:36 +00:00
|
|
|
node.requestManager.start()
|
2020-08-12 09:29:11 +00:00
|
|
|
node.startSyncManager()
|
2020-06-18 10:03:36 +00:00
|
|
|
|
2021-03-01 16:36:06 +00:00
|
|
|
if not startTime.toSlot().afterGenesis:
|
|
|
|
node.setupDoppelgangerDetection(startTime.slotOrZero())
|
2021-01-14 08:43:21 +00:00
|
|
|
node.addMessageHandlers()
|
|
|
|
doAssert node.getTopicSubscriptionEnabled()
|
2020-12-01 10:43:02 +00:00
|
|
|
|
2020-11-02 18:02:27 +00:00
|
|
|
## Ctrl+C handling
|
|
|
|
proc controlCHandler() {.noconv.} =
|
|
|
|
when defined(windows):
|
|
|
|
# workaround for https://github.com/nim-lang/Nim/issues/4057
|
|
|
|
setupForeignThreadGc()
|
|
|
|
notice "Shutting down after having received SIGINT"
|
|
|
|
bnStatus = BeaconNodeStatus.Stopping
|
|
|
|
setControlCHook(controlCHandler)
|
2020-12-14 16:45:14 +00:00
|
|
|
# equivalent SIGTERM handler
|
|
|
|
when defined(posix):
|
|
|
|
proc SIGTERMHandler(signal: cint) {.noconv.} =
|
|
|
|
notice "Shutting down after having received SIGTERM"
|
|
|
|
bnStatus = BeaconNodeStatus.Stopping
|
|
|
|
c_signal(SIGTERM, SIGTERMHandler)
|
2020-11-02 18:02:27 +00:00
|
|
|
|
2020-05-19 18:57:35 +00:00
|
|
|
# main event loop
|
2020-09-28 15:19:57 +00:00
|
|
|
while bnStatus == BeaconNodeStatus.Running:
|
2020-05-19 18:57:35 +00:00
|
|
|
try:
|
|
|
|
poll()
|
|
|
|
except CatchableError as e:
|
|
|
|
debug "Exception in poll()", exc = e.name, err = e.msg
|
2020-04-20 14:59:18 +00:00
|
|
|
|
2020-05-19 18:57:35 +00:00
|
|
|
# time to say goodbye
|
|
|
|
node.stop()
|
2018-11-23 23:58:49 +00:00
|
|
|
|
2018-12-19 12:58:53 +00:00
|
|
|
var gPidFile: string
|
|
|
|
proc createPidFile(filename: string) =
|
2019-07-07 09:53:58 +00:00
|
|
|
writeFile filename, $os.getCurrentProcessId()
|
2018-12-19 12:58:53 +00:00
|
|
|
gPidFile = filename
|
2020-08-19 13:12:10 +00:00
|
|
|
addQuitProc proc {.noconv.} = discard io2.removeFile(gPidFile)
|
|
|
|
|
2020-06-11 12:13:12 +00:00
|
|
|
proc initializeNetworking(node: BeaconNode) {.async.} =
|
2020-11-16 19:15:43 +00:00
|
|
|
info "Listening to incoming network requests"
|
2020-08-03 17:35:27 +00:00
|
|
|
await node.network.startListening()
|
2020-06-11 12:13:12 +00:00
|
|
|
|
2020-06-19 17:42:28 +00:00
|
|
|
let addressFile = node.config.dataDir / "beacon_node.enr"
|
2020-06-11 12:13:12 +00:00
|
|
|
writeFile(addressFile, node.network.announcedENR.toURI)
|
|
|
|
|
2020-09-21 16:02:27 +00:00
|
|
|
await node.network.start()
|
2020-06-11 12:13:12 +00:00
|
|
|
|
2020-12-04 16:28:42 +00:00
|
|
|
func shouldWeStartWeb3(node: BeaconNode): bool =
|
|
|
|
(node.config.web3Mode == Web3Mode.enabled) or
|
2021-02-22 16:17:48 +00:00
|
|
|
(node.config.web3Mode == Web3Mode.auto and node.attachedValidators[].count > 0)
|
2020-12-04 16:28:42 +00:00
|
|
|
|
2019-11-25 12:47:29 +00:00
|
|
|
proc start(node: BeaconNode) =
|
|
|
|
let
|
2020-07-30 19:18:17 +00:00
|
|
|
head = node.chainDag.head
|
|
|
|
finalizedHead = node.chainDag.finalizedHead
|
2020-06-29 05:34:48 +00:00
|
|
|
genesisTime = node.beaconClock.fromNow(toBeaconTime(Slot 0))
|
2020-06-11 12:13:12 +00:00
|
|
|
|
2020-10-01 18:56:42 +00:00
|
|
|
notice "Starting beacon node",
|
2019-11-12 00:05:35 +00:00
|
|
|
version = fullVersionStr,
|
2020-11-16 19:15:43 +00:00
|
|
|
enr = node.network.announcedENR.toURI,
|
|
|
|
peerId = $node.network.switch.peerInfo.peerId,
|
2019-08-16 11:16:56 +00:00
|
|
|
timeSinceFinalization =
|
2020-11-16 19:15:43 +00:00
|
|
|
node.beaconClock.now() - finalizedHead.slot.toBeaconTime(),
|
2020-07-28 13:54:32 +00:00
|
|
|
head = shortLog(head),
|
2020-07-16 13:16:51 +00:00
|
|
|
finalizedHead = shortLog(finalizedHead),
|
2019-03-20 11:52:30 +00:00
|
|
|
SLOTS_PER_EPOCH,
|
|
|
|
SECONDS_PER_SLOT,
|
2019-09-12 01:45:04 +00:00
|
|
|
SPEC_VERSION,
|
2020-11-16 19:15:43 +00:00
|
|
|
dataDir = node.config.dataDir.string,
|
2021-02-22 16:17:48 +00:00
|
|
|
validators = node.attachedValidators[].count
|
2019-03-20 11:52:30 +00:00
|
|
|
|
2020-06-29 05:34:48 +00:00
|
|
|
if genesisTime.inFuture:
|
|
|
|
notice "Waiting for genesis", genesisIn = genesisTime.offset
|
|
|
|
|
2020-06-11 12:13:12 +00:00
|
|
|
waitFor node.initializeNetworking()
|
2020-11-12 16:21:04 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
# TODO this does not account for validators getting attached "later"
|
2020-12-04 16:28:42 +00:00
|
|
|
if node.eth1Monitor != nil and node.shouldWeStartWeb3:
|
2020-11-12 16:21:04 +00:00
|
|
|
node.eth1Monitor.start()
|
|
|
|
|
2019-03-20 11:52:30 +00:00
|
|
|
node.run()
|
|
|
|
|
2019-10-03 01:51:44 +00:00
|
|
|
func formatGwei(amount: uint64): string =
|
|
|
|
# TODO This is implemented in a quite a silly way.
|
|
|
|
# Better routines for formatting decimal numbers
|
|
|
|
# should exists somewhere else.
|
|
|
|
let
|
|
|
|
eth = amount div 1000000000
|
|
|
|
remainder = amount mod 1000000000
|
|
|
|
|
|
|
|
result = $eth
|
|
|
|
if remainder != 0:
|
|
|
|
result.add '.'
|
2020-12-01 18:08:55 +00:00
|
|
|
let remainderStr = $remainder
|
|
|
|
for i in remainderStr.len ..< 9:
|
|
|
|
result.add '0'
|
|
|
|
result.add remainderStr
|
2019-10-03 01:51:44 +00:00
|
|
|
while result[^1] == '0':
|
|
|
|
result.setLen(result.len - 1)
|
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
proc initStatusBar(node: BeaconNode) =
|
|
|
|
if not isatty(stdout): return
|
|
|
|
if not node.config.statusBarEnabled: return
|
|
|
|
|
|
|
|
enableTrueColors()
|
|
|
|
|
|
|
|
proc dataResolver(expr: string): string =
|
|
|
|
template justified: untyped = node.chainDag.head.atEpochStart(
|
|
|
|
node.chainDag.headState.data.data.current_justified_checkpoint.epoch)
|
|
|
|
# TODO:
|
|
|
|
# We should introduce a general API for resolving dot expressions
|
|
|
|
# such as `db.latest_block.slot` or `metrics.connected_peers`.
|
|
|
|
# Such an API can be shared between the RPC back-end, CLI tools
|
|
|
|
# such as ncli, a potential GraphQL back-end and so on.
|
|
|
|
# The status bar feature would allow the user to specify an
|
|
|
|
# arbitrary expression that is resolvable through this API.
|
|
|
|
case expr.toLowerAscii
|
|
|
|
of "connected_peers":
|
|
|
|
$(node.connectedPeersCount)
|
|
|
|
|
|
|
|
of "head_root":
|
|
|
|
shortLog(node.chainDag.head.root)
|
|
|
|
of "head_epoch":
|
|
|
|
$(node.chainDag.head.slot.epoch)
|
|
|
|
of "head_epoch_slot":
|
|
|
|
$(node.chainDag.head.slot mod SLOTS_PER_EPOCH)
|
|
|
|
of "head_slot":
|
|
|
|
$(node.chainDag.head.slot)
|
|
|
|
|
|
|
|
of "justifed_root":
|
|
|
|
shortLog(justified.blck.root)
|
|
|
|
of "justifed_epoch":
|
|
|
|
$(justified.slot.epoch)
|
|
|
|
of "justifed_epoch_slot":
|
|
|
|
$(justified.slot mod SLOTS_PER_EPOCH)
|
|
|
|
of "justifed_slot":
|
|
|
|
$(justified.slot)
|
|
|
|
|
|
|
|
of "finalized_root":
|
|
|
|
shortLog(node.chainDag.finalizedHead.blck.root)
|
|
|
|
of "finalized_epoch":
|
|
|
|
$(node.chainDag.finalizedHead.slot.epoch)
|
|
|
|
of "finalized_epoch_slot":
|
|
|
|
$(node.chainDag.finalizedHead.slot mod SLOTS_PER_EPOCH)
|
|
|
|
of "finalized_slot":
|
|
|
|
$(node.chainDag.finalizedHead.slot)
|
|
|
|
|
|
|
|
of "epoch":
|
|
|
|
$node.currentSlot.epoch
|
|
|
|
|
|
|
|
of "epoch_slot":
|
|
|
|
$(node.currentSlot mod SLOTS_PER_EPOCH)
|
|
|
|
|
|
|
|
of "slot":
|
|
|
|
$node.currentSlot
|
|
|
|
|
|
|
|
of "slots_per_epoch":
|
|
|
|
$SLOTS_PER_EPOCH
|
|
|
|
|
|
|
|
of "slot_trailing_digits":
|
|
|
|
var slotStr = $node.currentSlot
|
|
|
|
if slotStr.len > 3: slotStr = slotStr[^3..^1]
|
|
|
|
slotStr
|
|
|
|
|
|
|
|
of "attached_validators_balance":
|
|
|
|
formatGwei(node.attachedValidatorBalanceTotal)
|
|
|
|
|
|
|
|
of "sync_status":
|
|
|
|
if isNil(node.syncManager):
|
|
|
|
"pending"
|
|
|
|
else:
|
|
|
|
if node.syncManager.inProgress:
|
|
|
|
node.syncManager.syncStatus
|
|
|
|
else:
|
|
|
|
"synced"
|
|
|
|
else:
|
|
|
|
# We ignore typos for now and just render the expression
|
|
|
|
# as it was written. TODO: come up with a good way to show
|
|
|
|
# an error message to the user.
|
|
|
|
"$" & expr
|
|
|
|
|
|
|
|
var statusBar = StatusBarView.init(
|
|
|
|
node.config.statusBarContents,
|
|
|
|
dataResolver)
|
|
|
|
|
|
|
|
when compiles(defaultChroniclesStream.output.writer):
|
|
|
|
defaultChroniclesStream.output.writer =
|
|
|
|
proc (logLevel: LogLevel, msg: LogOutputStr) {.raises: [Defect].} =
|
|
|
|
try:
|
|
|
|
# p.hidePrompt
|
|
|
|
erase statusBar
|
|
|
|
# p.writeLine msg
|
|
|
|
stdout.write msg
|
|
|
|
render statusBar
|
|
|
|
# p.showPrompt
|
|
|
|
except Exception as e: # render raises Exception
|
|
|
|
logLoggingFailure(cstring(msg), e)
|
|
|
|
|
|
|
|
proc statusBarUpdatesPollingLoop() {.async.} =
|
|
|
|
try:
|
|
|
|
while true:
|
|
|
|
update statusBar
|
|
|
|
erase statusBar
|
|
|
|
render statusBar
|
|
|
|
await sleepAsync(chronos.seconds(1))
|
|
|
|
except CatchableError as exc:
|
|
|
|
warn "Failed to update status bar, no further updates", err = exc.msg
|
|
|
|
|
|
|
|
asyncSpawn statusBarUpdatesPollingLoop()
|
|
|
|
|
2019-10-02 12:38:14 +00:00
|
|
|
when hasPrompt:
|
2021-02-22 16:17:48 +00:00
|
|
|
# TODO: nim-prompt seems to have threading issues at the moment
|
|
|
|
# which result in sporadic crashes. We should introduce a
|
|
|
|
# lock that guards the access to the internal prompt line
|
|
|
|
# variable.
|
|
|
|
#
|
|
|
|
# var p = Prompt.init("nimbus > ", providePromptCompletions)
|
|
|
|
# p.useHistoryFile()
|
|
|
|
|
2019-10-02 12:38:14 +00:00
|
|
|
from unicode import Rune
|
2020-06-23 19:11:07 +00:00
|
|
|
import prompt
|
2019-10-02 12:38:14 +00:00
|
|
|
|
2020-06-30 13:53:57 +00:00
|
|
|
func providePromptCompletions*(line: seq[Rune], cursorPos: int): seq[string] =
|
2019-10-02 12:38:14 +00:00
|
|
|
# TODO
|
|
|
|
# The completions should be generated with the general-purpose command-line
|
|
|
|
# parsing API of Confutils
|
|
|
|
result = @[]
|
|
|
|
|
2019-10-03 01:51:44 +00:00
|
|
|
proc processPromptCommands(p: ptr Prompt) {.thread.} =
|
|
|
|
while true:
|
|
|
|
var cmd = p[].readLine()
|
|
|
|
case cmd
|
|
|
|
of "quit":
|
|
|
|
quit 0
|
|
|
|
else:
|
|
|
|
p[].writeLine("Unknown command: " & cmd)
|
2019-10-02 12:38:14 +00:00
|
|
|
|
2019-10-03 01:51:44 +00:00
|
|
|
proc initPrompt(node: BeaconNode) =
|
2021-02-22 16:17:48 +00:00
|
|
|
# var t: Thread[ptr Prompt]
|
|
|
|
# createThread(t, processPromptCommands, addr p)
|
|
|
|
discard
|
2019-10-02 12:38:14 +00:00
|
|
|
|
2020-11-27 19:48:33 +00:00
|
|
|
proc handleValidatorExitCommand(config: BeaconNodeConf) {.async.} =
|
|
|
|
let port = try:
|
|
|
|
let value = parseInt(config.rpcUrlForExit.port)
|
|
|
|
if value < Port.low.int or value > Port.high.int:
|
|
|
|
raise newException(ValueError,
|
|
|
|
"The port number must be between " & $Port.low & " and " & $Port.high)
|
|
|
|
Port value
|
|
|
|
except CatchableError as err:
|
|
|
|
fatal "Invalid port number", err = err.msg
|
|
|
|
quit 1
|
|
|
|
|
|
|
|
let rpcClient = newRpcHttpClient()
|
|
|
|
|
|
|
|
try:
|
|
|
|
await connect(rpcClient, config.rpcUrlForExit.hostname, port)
|
|
|
|
except CatchableError as err:
|
|
|
|
fatal "Failed to connect to the beacon node RPC service", err = err.msg
|
|
|
|
quit 1
|
|
|
|
|
2021-02-15 16:40:00 +00:00
|
|
|
let (validator, validatorIdx, _, _) = try:
|
2020-11-27 19:48:33 +00:00
|
|
|
await rpcClient.get_v1_beacon_states_stateId_validators_validatorId(
|
|
|
|
"head", config.exitedValidator)
|
|
|
|
except CatchableError as err:
|
|
|
|
fatal "Failed to obtain information for validator", err = err.msg
|
|
|
|
quit 1
|
|
|
|
|
|
|
|
let exitAtEpoch = if config.exitAtEpoch.isSome:
|
|
|
|
Epoch config.exitAtEpoch.get
|
|
|
|
else:
|
|
|
|
let headSlot = try:
|
|
|
|
await rpcClient.getBeaconHead()
|
|
|
|
except CatchableError as err:
|
|
|
|
fatal "Failed to obtain the current head slot", err = err.msg
|
|
|
|
quit 1
|
|
|
|
headSlot.epoch
|
|
|
|
|
|
|
|
let
|
|
|
|
validatorsDir = config.validatorsDir
|
|
|
|
validatorKeyAsStr = "0x" & $validator.pubkey
|
|
|
|
keystoreDir = validatorsDir / validatorKeyAsStr
|
|
|
|
|
|
|
|
if not dirExists(keystoreDir):
|
|
|
|
echo "The validator keystores directory '" & config.validatorsDir.string &
|
|
|
|
"' does not contain a keystore for the selected validator with public " &
|
|
|
|
"key '" & validatorKeyAsStr & "'."
|
|
|
|
quit 1
|
|
|
|
|
|
|
|
let signingKey = loadKeystore(
|
|
|
|
validatorsDir,
|
|
|
|
config.secretsDir,
|
|
|
|
validatorKeyAsStr,
|
|
|
|
config.nonInteractive)
|
|
|
|
|
|
|
|
if signingKey.isNone:
|
|
|
|
fatal "Unable to continue without decrypted signing key"
|
|
|
|
quit 1
|
|
|
|
|
|
|
|
let fork = try:
|
|
|
|
await rpcClient.get_v1_beacon_states_fork("head")
|
|
|
|
except CatchableError as err:
|
|
|
|
fatal "Failed to obtain the fork id of the head state", err = err.msg
|
|
|
|
quit 1
|
|
|
|
|
|
|
|
let genesisValidatorsRoot = try:
|
|
|
|
(await rpcClient.get_v1_beacon_genesis()).genesis_validators_root
|
|
|
|
except CatchableError as err:
|
|
|
|
fatal "Failed to obtain the genesis validators root of the network",
|
|
|
|
err = err.msg
|
|
|
|
quit 1
|
|
|
|
|
|
|
|
var signedExit = SignedVoluntaryExit(
|
|
|
|
message: VoluntaryExit(
|
|
|
|
epoch: exitAtEpoch,
|
|
|
|
validator_index: validatorIdx))
|
|
|
|
|
|
|
|
signedExit.signature = get_voluntary_exit_signature(
|
|
|
|
fork, genesisValidatorsRoot, signedExit.message, signingKey.get)
|
|
|
|
|
|
|
|
template ask(prompt: string): string =
|
|
|
|
try:
|
|
|
|
stdout.write prompt, ": "
|
|
|
|
stdin.readLine()
|
2021-02-15 16:40:00 +00:00
|
|
|
except IOError:
|
2020-11-27 19:48:33 +00:00
|
|
|
fatal "Failed to read user input from stdin"
|
|
|
|
quit 1
|
|
|
|
|
|
|
|
try:
|
|
|
|
echoP "PLEASE BEWARE!"
|
|
|
|
|
|
|
|
echoP "Publishing a voluntary exit is an irreversible operation! " &
|
|
|
|
"You won't be able to restart again with the same validator."
|
|
|
|
|
|
|
|
echoP "By requesting an exit now, you'll be exempt from penalties " &
|
|
|
|
"stemming from not performing your validator duties, but you " &
|
2020-11-29 21:07:33 +00:00
|
|
|
"won't be able to withdraw your deposited funds for the time " &
|
2020-11-27 19:48:33 +00:00
|
|
|
"being. This means that your funds will be effectively frozen " &
|
2020-11-29 21:07:33 +00:00
|
|
|
"until withdrawals are enabled in a future phase of Eth2."
|
2020-12-01 08:44:30 +00:00
|
|
|
|
2020-11-27 19:48:33 +00:00
|
|
|
|
|
|
|
echoP "To understand more about the Eth2 roadmap, we recommend you " &
|
|
|
|
"have a look at\n" &
|
|
|
|
"https://ethereum.org/en/eth2/#roadmap"
|
|
|
|
|
2020-11-29 21:07:33 +00:00
|
|
|
echoP "You must keep your validator running for at least 5 epochs " &
|
2020-11-27 19:48:33 +00:00
|
|
|
"(32 minutes) after requesting a validator exit, as you will " &
|
|
|
|
"still be required to perform validator duties until your exit " &
|
|
|
|
"has been processed. The number of epochs could be significantly " &
|
|
|
|
"higher depending on how many other validators are queued to exit."
|
|
|
|
|
|
|
|
echoP "As such, we recommend you keep track of your validator's status " &
|
|
|
|
"using an Eth2 block explorer before shutting down your beacon node."
|
|
|
|
|
|
|
|
const
|
|
|
|
confirmation = "I understand the implications of submitting a voluntary exit"
|
|
|
|
|
|
|
|
while true:
|
|
|
|
echoP "To proceed to submitting your voluntary exit, please type '" &
|
|
|
|
confirmation & "' (without the quotes) in the prompt below and " &
|
|
|
|
"press ENTER or type 'q' to quit."
|
|
|
|
echo ""
|
|
|
|
|
|
|
|
let choice = ask "Your choice"
|
|
|
|
if choice == "q":
|
|
|
|
quit 0
|
|
|
|
elif choice == confirmation:
|
|
|
|
let success = await rpcClient.post_v1_beacon_pool_voluntary_exits(signedExit)
|
|
|
|
if success:
|
|
|
|
echo "Successfully published voluntary exit for validator " &
|
|
|
|
$validatorIdx & "(" & validatorKeyAsStr[0..9] & ")."
|
|
|
|
quit 0
|
|
|
|
else:
|
|
|
|
echo "The voluntary exit was not submitted successfully. Please try again."
|
|
|
|
quit 1
|
|
|
|
except CatchableError as err:
|
2021-01-15 17:39:45 +00:00
|
|
|
fatal "Failed to send the signed exit message to the beacon node RPC",
|
|
|
|
err = err.msg
|
2020-11-27 19:48:33 +00:00
|
|
|
quit 1
|
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
proc loadEth2Network(config: BeaconNodeConf): Eth2NetworkMetadata =
|
|
|
|
if config.eth2Network.isSome:
|
|
|
|
getMetadataForNetwork(config.eth2Network.get)
|
|
|
|
else:
|
|
|
|
when const_preset == "mainnet":
|
|
|
|
mainnetMetadata
|
|
|
|
else:
|
|
|
|
# Presumably other configurations can have other defaults, but for now
|
|
|
|
# this simplifies the flow
|
|
|
|
echo "Must specify network on non-mainnet node"
|
|
|
|
quit 1
|
2019-01-16 23:01:15 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
proc loadBeaconNode(config: var BeaconNodeConf, rng: ref BrHmacDrbgContext): BeaconNode =
|
|
|
|
let metadata = config.loadEth2Network()
|
|
|
|
|
|
|
|
# Updating the config based on the metadata certainly is not beautiful but it
|
|
|
|
# works
|
|
|
|
for node in metadata.bootstrapNodes:
|
|
|
|
config.bootstrapNodes.add node
|
|
|
|
|
|
|
|
BeaconNode.init(
|
|
|
|
metadata.runtimePreset,
|
|
|
|
rng,
|
|
|
|
config,
|
|
|
|
metadata.depositContractAddress,
|
|
|
|
metadata.depositContractDeployedAt,
|
|
|
|
metadata.eth1Network,
|
|
|
|
metadata.genesisData,
|
|
|
|
metadata.genesisDepositsSnapshot)
|
|
|
|
|
|
|
|
proc doRunBeaconNode(config: var BeaconNodeConf, rng: ref BrHmacDrbgContext) =
|
|
|
|
info "Launching beacon node",
|
|
|
|
version = fullVersionStr,
|
|
|
|
bls_backend = $BLS_BACKEND,
|
|
|
|
cmdParams = commandLineParams(),
|
|
|
|
config
|
|
|
|
|
|
|
|
createPidFile(config.dataDir.string / "beacon_node.pid")
|
|
|
|
|
|
|
|
config.createDumpDirs()
|
|
|
|
|
|
|
|
if config.metricsEnabled:
|
|
|
|
when useInsecureFeatures:
|
|
|
|
let metricsAddress = config.metricsAddress
|
|
|
|
notice "Starting metrics HTTP server",
|
|
|
|
url = "http://" & $metricsAddress & ":" & $config.metricsPort & "/metrics"
|
|
|
|
metrics.startHttpServer($metricsAddress, config.metricsPort)
|
|
|
|
else:
|
|
|
|
warn "Metrics support disabled, see https://status-im.github.io/nimbus-eth2/metrics-pretty-pictures.html#simple-metrics"
|
2020-10-09 13:57:45 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
# There are no managed event loops in here, to do a graceful shutdown, but
|
|
|
|
# letting the default Ctrl+C handler exit is safe, since we only read from
|
|
|
|
# the db.
|
|
|
|
let node = loadBeaconNode(config, rng)
|
2020-07-07 23:02:14 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
if bnStatus == BeaconNodeStatus.Stopping:
|
|
|
|
return
|
2020-07-02 15:14:11 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
initStatusBar(node)
|
2020-07-02 15:52:48 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
when hasPrompt:
|
|
|
|
initPrompt(node)
|
2020-11-24 21:21:47 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
if node.nickname != "":
|
|
|
|
dynamicLogScope(node = node.nickname): node.start()
|
2020-07-07 23:02:14 +00:00
|
|
|
else:
|
2021-02-22 16:17:48 +00:00
|
|
|
node.start()
|
|
|
|
|
|
|
|
proc doCreateTestnet(config: BeaconNodeConf, rng: var BrHmacDrbgContext) =
|
|
|
|
let launchPadDeposits = try:
|
|
|
|
Json.loadFile(config.testnetDepositsFile.string, seq[LaunchPadDeposit])
|
|
|
|
except SerializationError as err:
|
|
|
|
error "Invalid LaunchPad deposits file",
|
|
|
|
err = formatMsg(err, config.testnetDepositsFile.string)
|
|
|
|
quit 1
|
2020-12-01 11:35:55 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
var deposits: seq[DepositData]
|
|
|
|
for i in config.firstValidator.int ..< launchPadDeposits.len:
|
|
|
|
deposits.add(launchPadDeposits[i] as DepositData)
|
2020-12-01 11:35:55 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
let
|
|
|
|
startTime = uint64(times.toUnix(times.getTime()) + config.genesisOffset)
|
|
|
|
outGenesis = config.outputGenesis.string
|
|
|
|
eth1Hash = if config.web3Url.len == 0: eth1BlockHash
|
|
|
|
else: (waitFor getEth1BlockHash(config.web3Url, blockId("latest"))).asEth2Digest
|
|
|
|
runtimePreset = getRuntimePresetForNetwork(config.eth2Network)
|
|
|
|
var
|
|
|
|
initialState = initialize_beacon_state_from_eth1(
|
|
|
|
runtimePreset, eth1Hash, startTime, deposits, {skipBlsValidation})
|
2020-07-02 15:14:11 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
# https://github.com/ethereum/eth2.0-pm/tree/6e41fcf383ebeb5125938850d8e9b4e9888389b4/interop/mocked_start#create-genesis-state
|
|
|
|
initialState.genesis_time = startTime
|
2020-07-07 15:51:02 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
doAssert initialState.validators.len > 0
|
2020-10-02 13:38:32 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
let outGenesisExt = splitFile(outGenesis).ext
|
|
|
|
if cmpIgnoreCase(outGenesisExt, ".json") == 0:
|
|
|
|
Json.saveFile(outGenesis, initialState, pretty = true)
|
|
|
|
echo "Wrote ", outGenesis
|
2020-06-02 19:59:51 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
let outSszGenesis = outGenesis.changeFileExt "ssz"
|
|
|
|
SSZ.saveFile(outSszGenesis, initialState[])
|
|
|
|
echo "Wrote ", outSszGenesis
|
2019-03-19 17:22:17 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
let bootstrapFile = config.outputBootstrapFile.string
|
|
|
|
if bootstrapFile.len > 0:
|
2019-10-29 16:46:41 +00:00
|
|
|
let
|
2021-02-22 16:17:48 +00:00
|
|
|
networkKeys = getPersistentNetKeys(rng, config)
|
|
|
|
netMetadata = getPersistentNetMetadata(config)
|
|
|
|
bootstrapEnr = enr.Record.init(
|
|
|
|
1, # sequence number
|
|
|
|
networkKeys.seckey.asEthKey,
|
|
|
|
some(config.bootstrapAddress),
|
|
|
|
some(config.bootstrapPort),
|
|
|
|
some(config.bootstrapPort),
|
|
|
|
[toFieldPair("eth2", SSZ.encode(enrForkIdFromState initialState[])),
|
|
|
|
toFieldPair("attnets", SSZ.encode(netMetadata.attnets))])
|
|
|
|
|
|
|
|
writeFile(bootstrapFile, bootstrapEnr.tryGet().toURI)
|
|
|
|
echo "Wrote ", bootstrapFile
|
|
|
|
|
|
|
|
proc doDeposits(config: BeaconNodeConf, rng: var BrHmacDrbgContext) =
|
|
|
|
case config.depositsCmd
|
|
|
|
#[
|
|
|
|
of DepositsCmd.create:
|
|
|
|
var seed: KeySeed
|
|
|
|
defer: burnMem(seed)
|
|
|
|
var walletPath: WalletPathPair
|
|
|
|
|
|
|
|
if config.existingWalletId.isSome:
|
|
|
|
let
|
|
|
|
id = config.existingWalletId.get
|
|
|
|
found = findWalletWithoutErrors(id)
|
2019-09-02 10:31:14 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
if found.isSome:
|
|
|
|
walletPath = found.get
|
|
|
|
else:
|
|
|
|
fatal "Unable to find wallet with the specified name/uuid", id
|
|
|
|
quit 1
|
2019-07-01 13:20:55 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
var unlocked = unlockWalletInteractively(walletPath.wallet)
|
|
|
|
if unlocked.isOk:
|
|
|
|
swap(seed, unlocked.get)
|
|
|
|
else:
|
|
|
|
# The failure will be reported in `unlockWalletInteractively`.
|
|
|
|
quit 1
|
|
|
|
else:
|
|
|
|
var walletRes = createWalletInteractively(rng[], config)
|
|
|
|
if walletRes.isErr:
|
|
|
|
fatal "Unable to create wallet", err = walletRes.error
|
|
|
|
quit 1
|
|
|
|
else:
|
|
|
|
swap(seed, walletRes.get.seed)
|
|
|
|
walletPath = walletRes.get.walletPath
|
2019-03-19 17:22:17 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
let vres = secureCreatePath(config.outValidatorsDir)
|
|
|
|
if vres.isErr():
|
|
|
|
fatal "Could not create directory", path = config.outValidatorsDir
|
|
|
|
quit QuitFailure
|
2019-03-19 17:22:17 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
let sres = secureCreatePath(config.outSecretsDir)
|
|
|
|
if sres.isErr():
|
|
|
|
fatal "Could not create directory", path = config.outSecretsDir
|
|
|
|
quit QuitFailure
|
2019-09-08 15:32:38 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
let deposits = generateDeposits(
|
|
|
|
runtimePreset,
|
|
|
|
rng[],
|
|
|
|
seed,
|
|
|
|
walletPath.wallet.nextAccount,
|
|
|
|
config.totalDeposits,
|
|
|
|
config.outValidatorsDir,
|
|
|
|
config.outSecretsDir)
|
|
|
|
|
|
|
|
if deposits.isErr:
|
|
|
|
fatal "Failed to generate deposits", err = deposits.error
|
|
|
|
quit 1
|
|
|
|
|
|
|
|
try:
|
|
|
|
let depositDataPath = if config.outDepositsFile.isSome:
|
|
|
|
config.outDepositsFile.get.string
|
2020-12-10 10:59:31 +00:00
|
|
|
else:
|
2021-02-22 16:17:48 +00:00
|
|
|
config.outValidatorsDir / "deposit_data-" & $epochTime() & ".json"
|
|
|
|
|
|
|
|
let launchPadDeposits =
|
|
|
|
mapIt(deposits.value, LaunchPadDeposit.init(runtimePreset, it))
|
|
|
|
|
|
|
|
Json.saveFile(depositDataPath, launchPadDeposits)
|
|
|
|
echo "Deposit data written to \"", depositDataPath, "\""
|
2018-12-19 12:58:53 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
walletPath.wallet.nextAccount += deposits.value.len
|
|
|
|
let status = saveWallet(walletPath)
|
|
|
|
if status.isErr:
|
|
|
|
fatal "Failed to update wallet file after generating deposits",
|
|
|
|
wallet = walletPath.path,
|
|
|
|
error = status.error
|
|
|
|
quit 1
|
|
|
|
except CatchableError as err:
|
|
|
|
fatal "Failed to create launchpad deposit data file", err = err.msg
|
2020-12-04 16:28:42 +00:00
|
|
|
quit 1
|
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
of DepositsCmd.status:
|
|
|
|
echo "The status command is not implemented yet"
|
|
|
|
quit 1
|
2020-10-02 13:38:32 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
#]#
|
|
|
|
of DepositsCmd.`import`:
|
|
|
|
let validatorKeysDir = if config.importedDepositsDir.isSome:
|
|
|
|
config.importedDepositsDir.get
|
|
|
|
else:
|
|
|
|
let cwd = os.getCurrentDir()
|
|
|
|
if dirExists(cwd / "validator_keys"):
|
|
|
|
InputDir(cwd / "validator_keys")
|
2020-07-17 20:59:50 +00:00
|
|
|
else:
|
2021-02-22 16:17:48 +00:00
|
|
|
echo "The default search path for validator keys is a sub-directory " &
|
|
|
|
"named 'validator_keys' in the current working directory. Since " &
|
|
|
|
"no such directory exists, please either provide the correct path" &
|
|
|
|
"as an argument or copy the imported keys in the expected location."
|
|
|
|
quit 1
|
2020-07-10 15:18:14 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
importKeystoresFromDir(
|
|
|
|
rng,
|
|
|
|
validatorKeysDir.string,
|
|
|
|
config.validatorsDir, config.secretsDir)
|
2020-08-27 18:23:41 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
of DepositsCmd.exit:
|
|
|
|
waitFor handleValidatorExitCommand(config)
|
2019-11-05 18:16:10 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
proc doWallets(config: BeaconNodeConf, rng: var BrHmacDrbgContext) =
|
|
|
|
template findWalletWithoutErrors(name: WalletName): auto =
|
|
|
|
let res = keystore_management.findWallet(config, name)
|
|
|
|
if res.isErr:
|
|
|
|
fatal "Failed to locate wallet", error = res.error
|
|
|
|
quit 1
|
|
|
|
res.get
|
|
|
|
|
|
|
|
case config.walletsCmd:
|
|
|
|
of WalletsCmd.create:
|
|
|
|
if config.createdWalletNameFlag.isSome:
|
|
|
|
let
|
|
|
|
name = config.createdWalletNameFlag.get
|
|
|
|
existingWallet = findWalletWithoutErrors(name)
|
|
|
|
if existingWallet.isSome:
|
|
|
|
echo "The Wallet '" & name.string & "' already exists."
|
2020-06-24 13:57:09 +00:00
|
|
|
quit 1
|
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
var walletRes = createWalletInteractively(rng, config)
|
|
|
|
if walletRes.isErr:
|
|
|
|
fatal "Unable to create wallet", err = walletRes.error
|
|
|
|
quit 1
|
|
|
|
burnMem(walletRes.get.seed)
|
|
|
|
|
|
|
|
of WalletsCmd.list:
|
|
|
|
for kind, walletFile in walkDir(config.walletsDir):
|
|
|
|
if kind != pcFile: continue
|
|
|
|
if checkSensitiveFilePermissions(walletFile):
|
|
|
|
let walletRes = loadWallet(walletFile)
|
|
|
|
if walletRes.isOk:
|
|
|
|
echo walletRes.get.longName
|
2020-07-17 20:59:50 +00:00
|
|
|
else:
|
2021-02-22 16:17:48 +00:00
|
|
|
warn "Found corrupt wallet file",
|
|
|
|
wallet = walletFile, error = walletRes.error
|
|
|
|
else:
|
|
|
|
warn "Found wallet file with insecure permissions",
|
|
|
|
wallet = walletFile
|
|
|
|
|
|
|
|
of WalletsCmd.restore:
|
|
|
|
restoreWalletInteractively(rng, config)
|
|
|
|
|
|
|
|
proc doRecord(config: BeaconNodeConf, rng: var BrHmacDrbgContext) =
|
|
|
|
case config.recordCmd:
|
|
|
|
of RecordCmd.create:
|
|
|
|
let netKeys = getPersistentNetKeys(rng, config)
|
|
|
|
|
|
|
|
var fieldPairs: seq[FieldPair]
|
|
|
|
for field in config.fields:
|
|
|
|
let fieldPair = field.split(":")
|
|
|
|
if fieldPair.len > 1:
|
|
|
|
fieldPairs.add(toFieldPair(fieldPair[0], hexToSeqByte(fieldPair[1])))
|
|
|
|
else:
|
|
|
|
fatal "Invalid field pair"
|
|
|
|
quit QuitFailure
|
2020-06-24 13:57:09 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
let record = enr.Record.init(
|
|
|
|
config.seqNumber,
|
|
|
|
netKeys.seckey.asEthKey,
|
|
|
|
some(config.ipExt),
|
|
|
|
some(config.tcpPortExt),
|
|
|
|
some(config.udpPortExt),
|
|
|
|
fieldPairs).expect("Record within size limits")
|
2020-07-01 09:13:56 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
echo record.toURI()
|
2020-08-21 19:36:42 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
of RecordCmd.print:
|
|
|
|
echo $config.recordPrint
|
2020-03-24 11:13:07 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
proc doWeb3Cmd(config: BeaconNodeConf) =
|
|
|
|
case config.web3Cmd:
|
|
|
|
of Web3Cmd.test:
|
|
|
|
let metadata = config.loadEth2Network()
|
|
|
|
waitFor testWeb3Provider(config.web3TestUrl,
|
|
|
|
metadata.depositContractAddress)
|
2020-11-27 19:48:33 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
programMain:
|
|
|
|
var
|
|
|
|
config = makeBannerAndConfig(clientId, BeaconNodeConf)
|
2020-11-28 18:50:09 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
setupStdoutLogging(config.logLevel)
|
2020-10-02 13:38:32 +00:00
|
|
|
|
2021-02-22 16:17:48 +00:00
|
|
|
if not(checkAndCreateDataDir(string(config.dataDir))):
|
|
|
|
# We are unable to access/create data folder or data folder's
|
|
|
|
# permissions are insecure.
|
|
|
|
quit QuitFailure
|
|
|
|
|
|
|
|
setupLogging(config.logLevel, config.logFile)
|
|
|
|
|
|
|
|
## This Ctrl+C handler exits the program in non-graceful way.
|
|
|
|
## It's responsible for handling Ctrl+C in sub-commands such
|
|
|
|
## as `wallets *` and `deposits *`. In a regular beacon node
|
|
|
|
## run, it will be overwritten later with a different handler
|
|
|
|
## performing a graceful exit.
|
|
|
|
proc exitImmediatelyOnCtrlC() {.noconv.} =
|
|
|
|
when defined(windows):
|
|
|
|
# workaround for https://github.com/nim-lang/Nim/issues/4057
|
|
|
|
setupForeignThreadGc()
|
|
|
|
echo "" # If we interrupt during an interactive prompt, this
|
|
|
|
# will move the cursor to the next line
|
|
|
|
notice "Shutting down after having received SIGINT"
|
|
|
|
quit 0
|
|
|
|
setControlCHook(exitImmediatelyOnCtrlC)
|
|
|
|
# equivalent SIGTERM handler
|
|
|
|
when defined(posix):
|
|
|
|
proc exitImmediatelyOnSIGTERM(signal: cint) {.noconv.} =
|
|
|
|
notice "Shutting down after having received SIGTERM"
|
|
|
|
quit 0
|
|
|
|
c_signal(SIGTERM, exitImmediatelyOnSIGTERM)
|
|
|
|
|
|
|
|
# Single RNG instance for the application - will be seeded on construction
|
|
|
|
# and avoid using system resources (such as urandom) after that
|
|
|
|
let rng = keys.newRng()
|
|
|
|
|
|
|
|
case config.cmd
|
|
|
|
of createTestnet: doCreateTestnet(config, rng[])
|
|
|
|
of noCommand: doRunBeaconNode(config, rng)
|
|
|
|
of deposits: doDeposits(config, rng[])
|
|
|
|
of wallets: doWallets(config, rng[])
|
|
|
|
of record: doRecord(config, rng[])
|
|
|
|
of web3: doWeb3Cmd(config)
|