2020-12-11 01:26:31 +00:00
|
|
|
package client
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"io"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/pkg/errors"
|
2022-01-06 17:33:08 +00:00
|
|
|
fieldparams "github.com/prysmaticlabs/prysm/config/fieldparams"
|
2021-09-21 19:59:25 +00:00
|
|
|
"github.com/prysmaticlabs/prysm/config/params"
|
2021-09-23 15:23:37 +00:00
|
|
|
"github.com/prysmaticlabs/prysm/encoding/bytesutil"
|
2021-09-17 21:55:24 +00:00
|
|
|
"github.com/prysmaticlabs/prysm/math"
|
2021-09-14 20:59:51 +00:00
|
|
|
"github.com/prysmaticlabs/prysm/monitoring/tracing"
|
2021-07-21 21:34:07 +00:00
|
|
|
ethpb "github.com/prysmaticlabs/prysm/proto/prysm/v1alpha1"
|
2021-09-15 00:09:04 +00:00
|
|
|
"github.com/prysmaticlabs/prysm/time/slots"
|
2021-03-16 15:00:05 +00:00
|
|
|
"github.com/prysmaticlabs/prysm/validator/keymanager/remote"
|
2020-12-11 01:26:31 +00:00
|
|
|
"go.opencensus.io/trace"
|
|
|
|
)
|
|
|
|
|
|
|
|
// WaitForActivation checks whether the validator pubkey is in the active
|
|
|
|
// validator set. If not, this operation will block until an activation message is
|
2021-03-05 18:33:39 +00:00
|
|
|
// received. This method also monitors the keymanager for updates while waiting for an activation
|
|
|
|
// from the gRPC server.
|
2021-03-12 17:23:56 +00:00
|
|
|
//
|
|
|
|
// If the channel parameter is nil, WaitForActivation creates and manages its own channel.
|
2022-01-06 17:33:08 +00:00
|
|
|
func (v *validator) WaitForActivation(ctx context.Context, accountsChangedChan chan [][fieldparams.BLSPubkeyLength]byte) error {
|
2021-03-05 18:33:39 +00:00
|
|
|
// Monitor the key manager for updates.
|
2021-03-12 17:23:56 +00:00
|
|
|
if accountsChangedChan == nil {
|
2022-01-06 17:33:08 +00:00
|
|
|
accountsChangedChan = make(chan [][fieldparams.BLSPubkeyLength]byte, 1)
|
2022-01-31 16:44:17 +00:00
|
|
|
km, err := v.Keymanager()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
sub := km.SubscribeAccountChanges(accountsChangedChan)
|
2021-03-12 17:23:56 +00:00
|
|
|
defer func() {
|
|
|
|
sub.Unsubscribe()
|
|
|
|
close(accountsChangedChan)
|
|
|
|
}()
|
|
|
|
}
|
2021-03-05 18:33:39 +00:00
|
|
|
|
|
|
|
return v.waitForActivation(ctx, accountsChangedChan)
|
|
|
|
}
|
|
|
|
|
|
|
|
// waitForActivation performs the following:
|
|
|
|
// 1) While the key manager is empty, poll the key manager until some validator keys exist.
|
|
|
|
// 2) Open a server side stream for activation events against the given keys.
|
|
|
|
// 3) In another go routine, the key manager is monitored for updates and emits an update event on
|
|
|
|
// the accountsChangedChan. When an event signal is received, restart the waitForActivation routine.
|
|
|
|
// 4) If the stream is reset in error, restart the routine.
|
|
|
|
// 5) If the stream returns a response indicating one or more validators are active, exit the routine.
|
2022-01-06 17:33:08 +00:00
|
|
|
func (v *validator) waitForActivation(ctx context.Context, accountsChangedChan <-chan [][fieldparams.BLSPubkeyLength]byte) error {
|
2020-12-11 01:26:31 +00:00
|
|
|
ctx, span := trace.StartSpan(ctx, "validator.WaitForActivation")
|
|
|
|
defer span.End()
|
|
|
|
|
|
|
|
validatingKeys, err := v.keyManager.FetchValidatingPublicKeys(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrap(err, "could not fetch validating keys")
|
|
|
|
}
|
2020-12-11 19:55:52 +00:00
|
|
|
if len(validatingKeys) == 0 {
|
|
|
|
log.Warn(msgNoKeysFetched)
|
|
|
|
|
|
|
|
ticker := time.NewTicker(keyRefetchPeriod)
|
|
|
|
defer ticker.Stop()
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-ticker.C:
|
2021-01-22 20:21:34 +00:00
|
|
|
validatingKeys, err = v.keyManager.FetchValidatingPublicKeys(ctx)
|
2020-12-11 19:55:52 +00:00
|
|
|
if err != nil {
|
|
|
|
return errors.Wrap(err, msgCouldNotFetchKeys)
|
|
|
|
}
|
2021-01-22 20:21:34 +00:00
|
|
|
if len(validatingKeys) == 0 {
|
2020-12-11 19:55:52 +00:00
|
|
|
log.Warn(msgNoKeysFetched)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
case <-ctx.Done():
|
|
|
|
log.Debug("Context closed, exiting fetching validating keys")
|
|
|
|
return ctx.Err()
|
|
|
|
}
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-12-11 01:26:31 +00:00
|
|
|
req := ðpb.ValidatorActivationRequest{
|
|
|
|
PublicKeys: bytesutil.FromBytes48Array(validatingKeys),
|
|
|
|
}
|
|
|
|
stream, err := v.validatorClient.WaitForActivation(ctx, req)
|
|
|
|
if err != nil {
|
2021-09-14 20:59:51 +00:00
|
|
|
tracing.AnnotateError(span, err)
|
2021-01-25 21:27:30 +00:00
|
|
|
attempts := streamAttempts(ctx)
|
2020-12-11 01:26:31 +00:00
|
|
|
log.WithError(err).WithField("attempts", attempts).
|
|
|
|
Error("Stream broken while waiting for activation. Reconnecting...")
|
|
|
|
// Reconnection attempt backoff, up to 60s.
|
2021-09-17 21:55:24 +00:00
|
|
|
time.Sleep(time.Second * time.Duration(math.Min(uint64(attempts), 60)))
|
2021-03-05 18:33:39 +00:00
|
|
|
return v.waitForActivation(incrementRetries(ctx), accountsChangedChan)
|
2020-12-11 01:26:31 +00:00
|
|
|
}
|
2021-03-16 15:00:05 +00:00
|
|
|
|
|
|
|
remoteKm, ok := v.keyManager.(remote.RemoteKeymanager)
|
|
|
|
if ok {
|
2022-06-18 10:14:43 +00:00
|
|
|
if err = v.handleWithRemoteKeyManager(ctx, accountsChangedChan, &remoteKm); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if err = v.handleWithoutRemoteKeyManager(ctx, accountsChangedChan, &stream, span); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
v.ticker = slots.NewSlotTicker(time.Unix(int64(v.genesisTime), 0), params.BeaconConfig().SecondsPerSlot)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (v *validator) handleWithRemoteKeyManager(ctx context.Context, accountsChangedChan <-chan [][fieldparams.BLSPubkeyLength]byte, remoteKm *remote.RemoteKeymanager) error {
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-accountsChangedChan:
|
|
|
|
// Accounts (keys) changed, restart the process.
|
|
|
|
return v.waitForActivation(ctx, accountsChangedChan)
|
|
|
|
case <-v.NextSlot():
|
|
|
|
if ctx.Err() == context.Canceled {
|
|
|
|
return errors.Wrap(ctx.Err(), "context canceled, not waiting for activation anymore")
|
|
|
|
}
|
|
|
|
validatingKeys, err := (*remoteKm).ReloadPublicKeys(ctx)
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrap(err, msgCouldNotFetchKeys)
|
|
|
|
}
|
|
|
|
statusRequestKeys := make([][]byte, len(validatingKeys))
|
|
|
|
for i := range validatingKeys {
|
|
|
|
statusRequestKeys[i] = validatingKeys[i][:]
|
|
|
|
}
|
|
|
|
resp, err := v.validatorClient.MultipleValidatorStatus(ctx, ðpb.MultipleValidatorStatusRequest{
|
|
|
|
PublicKeys: statusRequestKeys,
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
statuses := make([]*validatorStatus, len(resp.Statuses))
|
|
|
|
for i, s := range resp.Statuses {
|
|
|
|
statuses[i] = &validatorStatus{
|
|
|
|
publicKey: resp.PublicKeys[i],
|
|
|
|
status: s,
|
|
|
|
index: resp.Indices[i],
|
2020-12-11 01:26:31 +00:00
|
|
|
}
|
2022-06-18 10:14:43 +00:00
|
|
|
}
|
2021-03-16 15:00:05 +00:00
|
|
|
|
2022-06-18 10:14:43 +00:00
|
|
|
valActivated := v.checkAndLogValidatorStatus(statuses)
|
|
|
|
if valActivated {
|
|
|
|
logActiveValidatorStatus(statuses)
|
|
|
|
// Set properties on the beacon node like the fee recipient for validators that are being used & active.
|
|
|
|
if err := v.PushProposerSettings(ctx, *remoteKm); err != nil {
|
|
|
|
return err
|
2021-04-30 15:15:22 +00:00
|
|
|
}
|
2022-06-18 10:14:43 +00:00
|
|
|
} else {
|
|
|
|
continue
|
2021-03-16 15:00:05 +00:00
|
|
|
}
|
|
|
|
}
|
2022-06-18 10:14:43 +00:00
|
|
|
break
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (v *validator) handleWithoutRemoteKeyManager(ctx context.Context, accountsChangedChan <-chan [][fieldparams.BLSPubkeyLength]byte, stream *ethpb.BeaconNodeValidator_WaitForActivationClient, span *trace.Span) error {
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-accountsChangedChan:
|
|
|
|
// Accounts (keys) changed, restart the process.
|
|
|
|
return v.waitForActivation(ctx, accountsChangedChan)
|
|
|
|
default:
|
|
|
|
res, err := (*stream).Recv()
|
|
|
|
// If the stream is closed, we stop the loop.
|
|
|
|
if errors.Is(err, io.EOF) {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
// If context is canceled we return from the function.
|
|
|
|
if ctx.Err() == context.Canceled {
|
|
|
|
return errors.Wrap(ctx.Err(), "context has been canceled so shutting down the loop")
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
tracing.AnnotateError(span, err)
|
|
|
|
attempts := streamAttempts(ctx)
|
|
|
|
log.WithError(err).WithField("attempts", attempts).
|
|
|
|
Error("Stream broken while waiting for activation. Reconnecting...")
|
|
|
|
// Reconnection attempt backoff, up to 60s.
|
|
|
|
time.Sleep(time.Second * time.Duration(math.Min(uint64(attempts), 60)))
|
|
|
|
return v.waitForActivation(incrementRetries(ctx), accountsChangedChan)
|
|
|
|
}
|
2021-03-16 15:00:05 +00:00
|
|
|
|
2022-06-18 10:14:43 +00:00
|
|
|
statuses := make([]*validatorStatus, len(res.Statuses))
|
|
|
|
for i, s := range res.Statuses {
|
|
|
|
statuses[i] = &validatorStatus{
|
|
|
|
publicKey: s.PublicKey,
|
|
|
|
status: s.Status,
|
|
|
|
index: s.Index,
|
2021-03-16 15:00:05 +00:00
|
|
|
}
|
2022-06-18 10:14:43 +00:00
|
|
|
}
|
2021-03-16 15:00:05 +00:00
|
|
|
|
2022-06-18 10:14:43 +00:00
|
|
|
valActivated := v.checkAndLogValidatorStatus(statuses)
|
|
|
|
if valActivated {
|
|
|
|
logActiveValidatorStatus(statuses)
|
2022-06-06 19:32:41 +00:00
|
|
|
|
2022-06-18 10:14:43 +00:00
|
|
|
// Set properties on the beacon node like the fee recipient for validators that are being used & active.
|
|
|
|
if err := v.PushProposerSettings(ctx, v.keyManager); err != nil {
|
|
|
|
return err
|
2021-03-16 15:00:05 +00:00
|
|
|
}
|
2022-06-18 10:14:43 +00:00
|
|
|
} else {
|
|
|
|
continue
|
2020-12-11 01:26:31 +00:00
|
|
|
}
|
|
|
|
}
|
2022-06-18 10:14:43 +00:00
|
|
|
break
|
2020-12-11 01:26:31 +00:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Preferred way to use context keys is with a non built-in type. See: RVV-B0003
|
|
|
|
type waitForActivationContextKey string
|
|
|
|
|
|
|
|
const waitForActivationAttemptsContextKey = waitForActivationContextKey("WaitForActivation-attempts")
|
|
|
|
|
2021-01-25 21:27:30 +00:00
|
|
|
func streamAttempts(ctx context.Context) int {
|
2020-12-11 01:26:31 +00:00
|
|
|
attempts, ok := ctx.Value(waitForActivationAttemptsContextKey).(int)
|
|
|
|
if !ok {
|
|
|
|
return 1
|
|
|
|
}
|
|
|
|
return attempts
|
|
|
|
}
|
|
|
|
|
|
|
|
func incrementRetries(ctx context.Context) context.Context {
|
2021-01-25 21:27:30 +00:00
|
|
|
attempts := streamAttempts(ctx)
|
2020-12-11 01:26:31 +00:00
|
|
|
return context.WithValue(ctx, waitForActivationAttemptsContextKey, attempts+1)
|
|
|
|
}
|