erigon-pulse/cmd/sentinel/main.go
Giulio rebuffo dbf1225cb2
Added partial SSZ library (#7083)
Implements SSZ encode/decoding and hashtreeroot for simple list-lacking
data structures. does not account offset case.
2023-03-12 14:41:53 +00:00

251 lines
7.8 KiB
Go

/*
Copyright 2022 Erigon-Lightclient contributors
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package main
import (
"context"
"encoding/hex"
"fmt"
"os"
"time"
"github.com/ledgerwatch/log/v3"
"github.com/urfave/cli/v2"
"go.uber.org/zap/buffer"
sentinelrpc "github.com/ledgerwatch/erigon-lib/gointerfaces/sentinel"
"github.com/ledgerwatch/erigon/cl/cltypes"
"github.com/ledgerwatch/erigon/cl/cltypes/ssz"
"github.com/ledgerwatch/erigon/cl/fork"
lcCli "github.com/ledgerwatch/erigon/cmd/sentinel/cli"
"github.com/ledgerwatch/erigon/cmd/sentinel/cli/flags"
"github.com/ledgerwatch/erigon/cmd/sentinel/sentinel"
"github.com/ledgerwatch/erigon/cmd/sentinel/sentinel/communication/ssz_snappy"
"github.com/ledgerwatch/erigon/cmd/sentinel/sentinel/handshake"
"github.com/ledgerwatch/erigon/cmd/sentinel/sentinel/service"
"github.com/ledgerwatch/erigon/common"
sentinelapp "github.com/ledgerwatch/erigon/turbo/app"
)
func main() {
app := sentinelapp.MakeApp(runSentinelNode, flags.CLDefaultFlags)
if err := app.Run(os.Args); err != nil {
_, printErr := fmt.Fprintln(os.Stderr, err)
if printErr != nil {
log.Warn("Fprintln error", "err", printErr)
}
os.Exit(1)
}
}
func check(err error) {
if err != nil {
panic(err)
}
}
func constructBodyFreeRequest(t string) *sentinelrpc.RequestData {
return &sentinelrpc.RequestData{
Topic: t,
}
}
func constructRequest(t string, reqBody ssz.EncodableSSZ) (*sentinelrpc.RequestData, error) {
var buffer buffer.Buffer
if err := ssz_snappy.EncodeAndWrite(&buffer, reqBody); err != nil {
return nil, fmt.Errorf("unable to encode request body: %v", err)
}
data := common.CopyBytes(buffer.Bytes())
return &sentinelrpc.RequestData{
Data: data,
Topic: t,
}, nil
}
func runSentinelNode(cliCtx *cli.Context) error {
cfg, _ := lcCli.SetupConsensusClientCfg(cliCtx)
//ctx := context.Background()
log.Root().SetHandler(log.LvlFilterHandler(log.Lvl(cfg.LogLvl), log.StderrHandler))
log.Info("[Sentinel] running sentinel with configuration", "cfg", cfg)
_, err := service.StartSentinelService(&sentinel.SentinelConfig{
IpAddr: cfg.Addr,
Port: int(cfg.Port),
TCPPort: cfg.ServerTcpPort,
GenesisConfig: cfg.GenesisCfg,
NetworkConfig: cfg.NetworkCfg,
BeaconConfig: cfg.BeaconCfg,
NoDiscovery: cfg.NoDiscovery,
}, nil, &service.ServerConfig{Network: cfg.ServerProtocol, Addr: cfg.ServerAddr}, nil, nil, handshake.NoRule)
if err != nil {
log.Error("[Sentinel] Could not start sentinel", "err", err)
return err
}
log.Info("[Sentinel] Sentinel started", "addr", cfg.ServerAddr)
digest, err := fork.ComputeForkDigest(cfg.BeaconCfg, cfg.GenesisCfg)
if err != nil {
log.Error("[Sentinel] Could not compute fork digeest", "err", err)
return err
}
log.Info("[Sentinel] Fork digest", "data", digest)
log.Info("[Sentinel] Sending test request")
/*
sendRequest(ctx, s, constructBodyFreeRequest(handlers.LightClientFinalityUpdateV1))
sendRequest(ctx, s, constructBodyFreeRequest(handlers.MetadataProtocolV1))
sendRequest(ctx, s, constructBodyFreeRequest(handlers.MetadataProtocolV2))
sendRequest(ctx, s, constructBodyFreeRequest(handlers.LightClientOptimisticUpdateV1))
lcUpdateReq := &cltypes.LightClientUpdatesByRangeRequest{
Period: 604,
Count: 1,
}
blocksByRangeReq := &cltypes.BeaconBlocksByRangeRequest{
StartSlot: 5000005, // arbitrary slot (currently at ~5030000)
Count: 3,
Step: 1, // deprecated, must be set to 1.
}
roots := make([][32]byte, 3)
rawRoot1, err := hex.DecodeString("57dd8e0ee7ed614283fbf80ca19229752839d4a4e232148efd128e85edee9b12")
check(err)
rawRoot2, err := hex.DecodeString("1d527f21e17897198752838431821558d1b9864654bcaf476232da55458ed5ce")
check(err)
rawRoot3, err := hex.DecodeString("830eab2e3de70cc7ebc80b6c950ebb2a7946d8a6e3bb653f8b6dafd6a402d49b")
check(err)
copy(roots[0][:], rawRoot1)
copy(roots[1][:], rawRoot2)
copy(roots[2][:], rawRoot3)
var blocksByRootReq cltypes.BeaconBlocksByRootRequest = roots
// Getting fork digest into bytes array.
forkDigest := "4a26c58b"
fdSlice, err := hex.DecodeString(forkDigest)
check(err)
var fdArr [4]byte
copy(fdArr[:], fdSlice)
// Getting CP block root into bytes array.
cpRootRaw := "60ee0f7170ed4984e4a7e735dff36bce28d2fb03a3f698287b73415d70fe7355"
cpRootSlice, err := hex.DecodeString(cpRootRaw)
check(err)
var cpRootArr [32]byte
copy(cpRootArr[:], cpRootSlice)
// Getting head block root into bytes array.
headRootRaw := "b52fc95e02471414451e6cf465709f53f65145fc5efbb18817252c33e301fa3a"
headRootSlice, err := hex.DecodeString(headRootRaw)
check(err)
var headRootArr [32]byte
copy(headRootArr[:], headRootSlice)
// USING: https://beaconcha.in/slot/5101760 as the checkpoint & current block.
statusReq := &cltypes.Status{
ForkDigest: fdArr,
FinalizedRoot: cpRootArr,
FinalizedEpoch: 160285,
HeadRoot: headRootArr,
HeadSlot: 5129184,
}
blocksByRangeReq := &cltypes.BeaconBlocksByRangeRequest{
StartSlot: 5142800,
Count: 2,
Step: 1, // deprecated, must be set to 1.
}
req, err := constructRequest(handlers.BeaconBlocksByRangeProtocolV2, blocksByRangeReq)
if err != nil {
log.Error("[Sentinel] could not construct request", "err", err)
}
sendRequest(ctx, s, req)
*/
/*roots := make([][32]byte, 1)
rawRoot1, err := hex.DecodeString("cc85056af7f6e3e4835436cb12a09a9d56e0aac15d08436af82dbe0cd7ae60e0")
check(err)
copy(roots[0][:], rawRoot1)
var blocksByRootReq cltypes.BeaconBlocksByRootRequest = roots
req, err := constructRequest(communication.BeaconBlocksByRootProtocolV2, &blocksByRootReq)
if err != nil {
log.Error("[Sentinel] could not construct request", "err", err)
return err
}
sendRequest(ctx, s, req)*/
return nil
}
func debugGossip(ctx context.Context, s sentinelrpc.SentinelClient) {
subscription, err := s.SubscribeGossip(ctx, &sentinelrpc.EmptyMessage{})
if err != nil {
log.Error("[Sentinel] Could not start sentinel", "err", err)
return
}
for {
data, err := subscription.Recv()
if err != nil {
return
}
if data.Type != sentinelrpc.GossipType_AggregateAndProofGossipType {
continue
}
block := &cltypes.SignedAggregateAndProof{}
if err := block.DecodeSSZ(data.Data); err != nil {
log.Error("[Sentinel] Error", "err", err)
continue
}
log.Info("[Sentinel] Received", "msg", block)
}
}
// Debug function to recieve test packets on the req/resp domain.
func sendRequest(ctx context.Context, s sentinelrpc.SentinelClient, req *sentinelrpc.RequestData) {
newReqTicker := time.NewTicker(100 * time.Millisecond)
for {
select {
case <-ctx.Done():
case <-newReqTicker.C:
go func() {
log.Info("[Sentinel] Sending request", "data", req)
message, err := s.SendRequest(ctx, req)
if err != nil {
log.Error("[Sentinel] Error returned", "err", err)
return
}
if message.Error {
log.Error("[Sentinel] received error", "err", string(message.Data))
return
}
log.Info("[Sentinel] Non-error response received", "data", message.Data)
f, err := os.Create("out")
if err != nil {
panic(fmt.Sprintf("unable to open file: %v\n", err))
}
_, err = f.WriteString(hex.EncodeToString(message.Data))
if err != nil {
panic(fmt.Sprintf("unable to write to file: %v\n", err))
}
log.Info("[Sentinel] Hex representation", "data", hex.EncodeToString(message.Data))
f.Close()
}()
}
}
}