mirror of
https://gitlab.com/pulsechaincom/erigon-pulse.git
synced 2024-12-26 05:27:19 +00:00
251 lines
7.8 KiB
Go
251 lines
7.8 KiB
Go
/*
|
|
Copyright 2022 Erigon-Lightclient contributors
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package main
|
|
|
|
import (
|
|
"context"
|
|
"encoding/hex"
|
|
"fmt"
|
|
"os"
|
|
"time"
|
|
|
|
"github.com/ledgerwatch/log/v3"
|
|
"github.com/urfave/cli/v2"
|
|
"go.uber.org/zap/buffer"
|
|
|
|
sentinelrpc "github.com/ledgerwatch/erigon-lib/gointerfaces/sentinel"
|
|
"github.com/ledgerwatch/erigon/cl/cltypes"
|
|
"github.com/ledgerwatch/erigon/cl/fork"
|
|
lcCli "github.com/ledgerwatch/erigon/cmd/sentinel/cli"
|
|
"github.com/ledgerwatch/erigon/cmd/sentinel/cli/flags"
|
|
"github.com/ledgerwatch/erigon/cmd/sentinel/sentinel"
|
|
"github.com/ledgerwatch/erigon/cmd/sentinel/sentinel/communication"
|
|
"github.com/ledgerwatch/erigon/cmd/sentinel/sentinel/communication/ssz_snappy"
|
|
"github.com/ledgerwatch/erigon/cmd/sentinel/sentinel/handshake"
|
|
"github.com/ledgerwatch/erigon/cmd/sentinel/sentinel/service"
|
|
"github.com/ledgerwatch/erigon/common"
|
|
sentinelapp "github.com/ledgerwatch/erigon/turbo/app"
|
|
)
|
|
|
|
func main() {
|
|
app := sentinelapp.MakeApp(runSentinelNode, flags.CLDefaultFlags)
|
|
if err := app.Run(os.Args); err != nil {
|
|
_, printErr := fmt.Fprintln(os.Stderr, err)
|
|
if printErr != nil {
|
|
log.Warn("Fprintln error", "err", printErr)
|
|
}
|
|
os.Exit(1)
|
|
}
|
|
}
|
|
|
|
func check(err error) {
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
}
|
|
|
|
func constructBodyFreeRequest(t string) *sentinelrpc.RequestData {
|
|
return &sentinelrpc.RequestData{
|
|
Topic: t,
|
|
}
|
|
}
|
|
|
|
func constructRequest(t string, reqBody cltypes.ObjectSSZ) (*sentinelrpc.RequestData, error) {
|
|
var buffer buffer.Buffer
|
|
if err := ssz_snappy.EncodeAndWrite(&buffer, reqBody); err != nil {
|
|
return nil, fmt.Errorf("unable to encode request body: %v", err)
|
|
}
|
|
|
|
data := common.CopyBytes(buffer.Bytes())
|
|
return &sentinelrpc.RequestData{
|
|
Data: data,
|
|
Topic: t,
|
|
}, nil
|
|
}
|
|
|
|
func runSentinelNode(cliCtx *cli.Context) error {
|
|
cfg, _ := lcCli.SetupConsensusClientCfg(cliCtx)
|
|
ctx := context.Background()
|
|
|
|
log.Root().SetHandler(log.LvlFilterHandler(log.Lvl(cfg.LogLvl), log.StderrHandler))
|
|
log.Info("[Sentinel] running sentinel with configuration", "cfg", cfg)
|
|
s, err := service.StartSentinelService(&sentinel.SentinelConfig{
|
|
IpAddr: cfg.Addr,
|
|
Port: int(cfg.Port),
|
|
TCPPort: cfg.ServerTcpPort,
|
|
GenesisConfig: cfg.GenesisCfg,
|
|
NetworkConfig: cfg.NetworkCfg,
|
|
BeaconConfig: cfg.BeaconCfg,
|
|
NoDiscovery: cfg.NoDiscovery,
|
|
}, nil, &service.ServerConfig{Network: cfg.ServerProtocol, Addr: cfg.ServerAddr}, nil, nil, handshake.NoRule)
|
|
if err != nil {
|
|
log.Error("[Sentinel] Could not start sentinel", "err", err)
|
|
return err
|
|
}
|
|
log.Info("[Sentinel] Sentinel started", "addr", cfg.ServerAddr)
|
|
|
|
digest, err := fork.ComputeForkDigest(cfg.BeaconCfg, cfg.GenesisCfg)
|
|
if err != nil {
|
|
log.Error("[Sentinel] Could not compute fork digeest", "err", err)
|
|
return err
|
|
}
|
|
log.Info("[Sentinel] Fork digest", "data", digest)
|
|
|
|
log.Info("[Sentinel] Sending test request")
|
|
/*
|
|
sendRequest(ctx, s, constructBodyFreeRequest(handlers.LightClientFinalityUpdateV1))
|
|
sendRequest(ctx, s, constructBodyFreeRequest(handlers.MetadataProtocolV1))
|
|
sendRequest(ctx, s, constructBodyFreeRequest(handlers.MetadataProtocolV2))
|
|
sendRequest(ctx, s, constructBodyFreeRequest(handlers.LightClientOptimisticUpdateV1))
|
|
|
|
lcUpdateReq := &cltypes.LightClientUpdatesByRangeRequest{
|
|
Period: 604,
|
|
Count: 1,
|
|
}
|
|
|
|
blocksByRangeReq := &cltypes.BeaconBlocksByRangeRequest{
|
|
StartSlot: 5000005, // arbitrary slot (currently at ~5030000)
|
|
Count: 3,
|
|
Step: 1, // deprecated, must be set to 1.
|
|
}
|
|
|
|
roots := make([][32]byte, 3)
|
|
rawRoot1, err := hex.DecodeString("57dd8e0ee7ed614283fbf80ca19229752839d4a4e232148efd128e85edee9b12")
|
|
check(err)
|
|
rawRoot2, err := hex.DecodeString("1d527f21e17897198752838431821558d1b9864654bcaf476232da55458ed5ce")
|
|
check(err)
|
|
rawRoot3, err := hex.DecodeString("830eab2e3de70cc7ebc80b6c950ebb2a7946d8a6e3bb653f8b6dafd6a402d49b")
|
|
check(err)
|
|
|
|
copy(roots[0][:], rawRoot1)
|
|
copy(roots[1][:], rawRoot2)
|
|
copy(roots[2][:], rawRoot3)
|
|
|
|
var blocksByRootReq cltypes.BeaconBlocksByRootRequest = roots
|
|
|
|
// Getting fork digest into bytes array.
|
|
forkDigest := "4a26c58b"
|
|
fdSlice, err := hex.DecodeString(forkDigest)
|
|
check(err)
|
|
var fdArr [4]byte
|
|
copy(fdArr[:], fdSlice)
|
|
|
|
// Getting CP block root into bytes array.
|
|
cpRootRaw := "60ee0f7170ed4984e4a7e735dff36bce28d2fb03a3f698287b73415d70fe7355"
|
|
cpRootSlice, err := hex.DecodeString(cpRootRaw)
|
|
check(err)
|
|
var cpRootArr [32]byte
|
|
copy(cpRootArr[:], cpRootSlice)
|
|
|
|
// Getting head block root into bytes array.
|
|
headRootRaw := "b52fc95e02471414451e6cf465709f53f65145fc5efbb18817252c33e301fa3a"
|
|
headRootSlice, err := hex.DecodeString(headRootRaw)
|
|
check(err)
|
|
var headRootArr [32]byte
|
|
copy(headRootArr[:], headRootSlice)
|
|
|
|
// USING: https://beaconcha.in/slot/5101760 as the checkpoint & current block.
|
|
statusReq := &cltypes.Status{
|
|
ForkDigest: fdArr,
|
|
FinalizedRoot: cpRootArr,
|
|
FinalizedEpoch: 160285,
|
|
HeadRoot: headRootArr,
|
|
HeadSlot: 5129184,
|
|
}
|
|
|
|
blocksByRangeReq := &cltypes.BeaconBlocksByRangeRequest{
|
|
StartSlot: 5142800,
|
|
Count: 2,
|
|
Step: 1, // deprecated, must be set to 1.
|
|
}
|
|
req, err := constructRequest(handlers.BeaconBlocksByRangeProtocolV2, blocksByRangeReq)
|
|
if err != nil {
|
|
log.Error("[Sentinel] could not construct request", "err", err)
|
|
}
|
|
sendRequest(ctx, s, req)
|
|
*/
|
|
roots := make([][32]byte, 1)
|
|
rawRoot1, err := hex.DecodeString("cc85056af7f6e3e4835436cb12a09a9d56e0aac15d08436af82dbe0cd7ae60e0")
|
|
check(err)
|
|
|
|
copy(roots[0][:], rawRoot1)
|
|
|
|
var blocksByRootReq cltypes.BeaconBlocksByRootRequest = roots
|
|
req, err := constructRequest(communication.BeaconBlocksByRootProtocolV2, &blocksByRootReq)
|
|
if err != nil {
|
|
log.Error("[Sentinel] could not construct request", "err", err)
|
|
return err
|
|
}
|
|
sendRequest(ctx, s, req)
|
|
return nil
|
|
}
|
|
|
|
func debugGossip(ctx context.Context, s sentinelrpc.SentinelClient) {
|
|
subscription, err := s.SubscribeGossip(ctx, &sentinelrpc.EmptyMessage{})
|
|
if err != nil {
|
|
log.Error("[Sentinel] Could not start sentinel", "err", err)
|
|
return
|
|
}
|
|
for {
|
|
data, err := subscription.Recv()
|
|
if err != nil {
|
|
return
|
|
}
|
|
if data.Type != sentinelrpc.GossipType_AggregateAndProofGossipType {
|
|
continue
|
|
}
|
|
block := &cltypes.SignedAggregateAndProof{}
|
|
if err := block.UnmarshalSSZ(data.Data); err != nil {
|
|
log.Error("[Sentinel] Error", "err", err)
|
|
continue
|
|
}
|
|
log.Info("[Sentinel] Received", "msg", block)
|
|
}
|
|
}
|
|
|
|
// Debug function to recieve test packets on the req/resp domain.
|
|
func sendRequest(ctx context.Context, s sentinelrpc.SentinelClient, req *sentinelrpc.RequestData) {
|
|
newReqTicker := time.NewTicker(1000 * time.Millisecond)
|
|
for {
|
|
select {
|
|
case <-ctx.Done():
|
|
case <-newReqTicker.C:
|
|
go func() {
|
|
log.Info("[Sentinel] Sending request", "data", req)
|
|
message, err := s.SendRequest(ctx, req)
|
|
if err != nil {
|
|
log.Error("[Sentinel] Error returned", "err", err)
|
|
return
|
|
}
|
|
if message.Error {
|
|
log.Error("[Sentinel] received error", "err", string(message.Data))
|
|
return
|
|
}
|
|
|
|
log.Info("[Sentinel] Non-error response received", "data", message.Data)
|
|
f, err := os.Create("out")
|
|
if err != nil {
|
|
panic(fmt.Sprintf("unable to open file: %v\n", err))
|
|
}
|
|
_, err = f.WriteString(hex.EncodeToString(message.Data))
|
|
if err != nil {
|
|
panic(fmt.Sprintf("unable to write to file: %v\n", err))
|
|
}
|
|
log.Info("[Sentinel] Hex representation", "data", hex.EncodeToString(message.Data))
|
|
f.Close()
|
|
}()
|
|
}
|
|
}
|
|
}
|