// Package main defines a validator client, a critical actor in eth2 which manages // a keystore of private keys, connects to a beacon node to receive assignments, // and submits blocks/attestations as needed. package main import ( "context" "fmt" "os" "runtime" runtimeDebug "runtime/debug" "strings" "time" joonix "github.com/joonix/log" ethpb "github.com/prysmaticlabs/ethereumapis/eth/v1alpha1" "github.com/prysmaticlabs/prysm/shared/bytesutil" "github.com/prysmaticlabs/prysm/shared/cmd" "github.com/prysmaticlabs/prysm/shared/debug" "github.com/prysmaticlabs/prysm/shared/featureconfig" "github.com/prysmaticlabs/prysm/shared/logutil" "github.com/prysmaticlabs/prysm/shared/params" "github.com/prysmaticlabs/prysm/shared/version" "github.com/prysmaticlabs/prysm/validator/accounts" "github.com/prysmaticlabs/prysm/validator/client" "github.com/prysmaticlabs/prysm/validator/flags" "github.com/prysmaticlabs/prysm/validator/node" "github.com/sirupsen/logrus" prefixed "github.com/x-cray/logrus-prefixed-formatter" _ "go.uber.org/automaxprocs" "google.golang.org/grpc" "gopkg.in/urfave/cli.v2" "gopkg.in/urfave/cli.v2/altsrc" ) var log = logrus.WithField("prefix", "main") func startNode(ctx *cli.Context) error { validatorClient, err := node.NewValidatorClient(ctx) if err != nil { return err } validatorClient.Start() return nil } var appFlags = []cli.Flag{ flags.BeaconRPCProviderFlag, flags.CertFlag, flags.GraffitiFlag, flags.KeystorePathFlag, flags.MergeSourceDirectories, flags.MergeTargetDirectory, flags.PasswordFlag, flags.DisablePenaltyRewardLogFlag, flags.UnencryptedKeysFlag, flags.InteropStartIndex, flags.InteropNumValidators, flags.GrpcRetriesFlag, flags.GrpcHeadersFlag, flags.KeyManager, flags.KeyManagerOpts, flags.DisableAccountMetricsFlag, flags.MonitoringPortFlag, flags.SlasherRPCProviderFlag, flags.SlasherCertFlag, cmd.VerbosityFlag, cmd.DataDirFlag, cmd.ClearDB, cmd.ForceClearDB, cmd.EnableTracingFlag, cmd.TracingProcessNameFlag, cmd.TracingEndpointFlag, cmd.TraceSampleFractionFlag, cmd.LogFormat, cmd.LogFileName, cmd.ConfigFileFlag, cmd.ChainConfigFileFlag, cmd.GrpcMaxCallRecvMsgSizeFlag, debug.PProfFlag, debug.PProfAddrFlag, debug.PProfPortFlag, debug.MemProfileRateFlag, debug.CPUProfileFlag, debug.TraceFlag, } func init() { appFlags = cmd.WrapFlags(append(appFlags, featureconfig.ValidatorFlags...)) } func main() { app := cli.App{} app.Name = "validator" app.Usage = `launches an Ethereum 2.0 validator client that interacts with a beacon chain, starts proposer and attester services, p2p connections, and more` app.Version = version.GetVersion() app.Action = startNode app.Commands = []*cli.Command{ { Name: "accounts", Category: "accounts", Usage: "defines useful functions for interacting with the validator client's account", Subcommands: []*cli.Command{ { Name: "create", Description: `creates a new validator account keystore containing private keys for Ethereum 2.0 - this command outputs a deposit data string which can be used to deposit Ether into the ETH1.0 deposit contract in order to activate the validator client`, Flags: append(featureconfig.ActiveFlags(featureconfig.ValidatorFlags), []cli.Flag{ flags.KeystorePathFlag, flags.PasswordFlag, cmd.ChainConfigFileFlag, }...), Action: func(cliCtx *cli.Context) error { if cliCtx.IsSet(cmd.ChainConfigFileFlag.Name) { chainConfigFileName := cliCtx.String(cmd.ChainConfigFileFlag.Name) params.LoadChainConfigFile(chainConfigFileName) } featureconfig.ConfigureValidator(cliCtx) keystorePath, passphrase, err := accounts.HandleEmptyKeystoreFlags(cliCtx, true /*confirmPassword*/) if err != nil { log.WithError(err).Error("Could not list keys") } if _, _, err := accounts.CreateValidatorAccount(keystorePath, passphrase); err != nil { log.WithError(err).Fatalf("Could not create validator at path: %s", keystorePath) } return nil }, }, { Name: "keys", Description: `lists the private keys for 'keystore' keymanager keys`, Flags: []cli.Flag{ flags.KeystorePathFlag, flags.PasswordFlag, }, Action: func(cliCtx *cli.Context) error { keystorePath, passphrase, err := accounts.HandleEmptyKeystoreFlags(cliCtx, false /*confirmPassword*/) if err != nil { log.WithError(err).Error("Could not list keys") } if err := accounts.PrintPublicAndPrivateKeys(keystorePath, passphrase); err != nil { log.WithError(err).Errorf("Could not list private and public keys in path %s", keystorePath) } return nil }, }, { Name: "status", Description: `list the validator status for existing validator keys`, Flags: []cli.Flag{ cmd.GrpcMaxCallRecvMsgSizeFlag, flags.BeaconRPCProviderFlag, flags.CertFlag, flags.GrpcHeadersFlag, flags.GrpcRetriesFlag, flags.KeyManager, flags.KeyManagerOpts, }, Action: func(cliCtx *cli.Context) error { var err error var pubKeys [][]byte if cliCtx.String(flags.KeyManager.Name) != "" { pubKeysBytes48, success := node.ExtractPublicKeysFromKeyManager(cliCtx) pubKeys, err = bytesutil.FromBytes48Array(pubKeysBytes48), success } else { keystorePath, passphrase, err := accounts.HandleEmptyKeystoreFlags(cliCtx, false /*confirmPassword*/) if err != nil { return err } pubKeys, err = accounts.ExtractPublicKeysFromKeyStore(keystorePath, passphrase) } if err != nil { return err } ctx, cancel := context.WithTimeout( context.Background(), 10*time.Second /* Cancel if cannot connect to beacon node in 10 seconds. */) defer cancel() dialOpts := client.ConstructDialOptions( cliCtx.Int(cmd.GrpcMaxCallRecvMsgSizeFlag.Name), cliCtx.String(flags.CertFlag.Name), strings.Split(cliCtx.String(flags.GrpcHeadersFlag.Name), ","), cliCtx.Uint(flags.GrpcRetriesFlag.Name), grpc.WithBlock()) endpoint := cliCtx.String(flags.BeaconRPCProviderFlag.Name) conn, err := grpc.DialContext(ctx, endpoint, dialOpts...) if err != nil { log.WithError(err).Fatalf("Failed to dial beacon node endpoint at %s", endpoint) return err } err = accounts.RunStatusCommand(pubKeys, ethpb.NewBeaconNodeValidatorClient(conn)) if closed := conn.Close(); closed != nil { log.WithError(closed).Error("Could not close connection to beacon node") } return err }, }, { Name: "change-password", Description: "changes password for all keys located in a keystore", Flags: []cli.Flag{ flags.KeystorePathFlag, flags.PasswordFlag, }, Action: func(cliCtx *cli.Context) error { keystorePath, oldPassword, err := accounts.HandleEmptyKeystoreFlags(cliCtx, false /*confirmPassword*/) if err != nil { log.WithError(err).Error("Could not read keystore path and/or the old password") } log.Info("Please enter the new password") newPassword, err := cmd.EnterPassword(true, cmd.StdInPasswordReader{}) if err != nil { log.WithError(err).Error("Could not read the new password") } err = accounts.ChangePassword(keystorePath, oldPassword, newPassword) if err != nil { log.WithError(err).Error("Changing password failed") } else { log.Info("Password changed successfully") } return nil }, }, { Name: "merge", Description: "merges data from several validator databases into a new validator database", Flags: []cli.Flag{ flags.MergeSourceDirectories, flags.MergeTargetDirectory, }, Action: func(cliCtx *cli.Context) error { passedSources := cliCtx.String(flags.MergeSourceDirectories.Name) sources := strings.Split(passedSources, ",") target := cliCtx.String(flags.MergeTargetDirectory.Name) if err := accounts.Merge(context.Background(), sources, target); err != nil { log.WithError(err).Error("Merging validator data failed") } else { log.Info("Merge completed successfully") } return nil }, }, }, }, } app.Flags = appFlags app.Before = func(ctx *cli.Context) error { if ctx.IsSet(cmd.ConfigFileFlag.Name) { if err := altsrc.InitInputSourceWithContext(appFlags, altsrc.NewYamlSourceFromFlagFunc(cmd.ConfigFileFlag.Name))(ctx); err != nil { return err } } format := ctx.String(cmd.LogFormat.Name) switch format { case "text": formatter := new(prefixed.TextFormatter) formatter.TimestampFormat = "2006-01-02 15:04:05" formatter.FullTimestamp = true // If persistent log files are written - we disable the log messages coloring because // the colors are ANSI codes and seen as Gibberish in the log files. formatter.DisableColors = ctx.String(cmd.LogFileName.Name) != "" logrus.SetFormatter(formatter) break case "fluentd": f := joonix.NewFormatter() if err := joonix.DisableTimestampFormat(f); err != nil { panic(err) } logrus.SetFormatter(f) break case "json": logrus.SetFormatter(&logrus.JSONFormatter{}) break default: return fmt.Errorf("unknown log format %s", format) } logFileName := ctx.String(cmd.LogFileName.Name) if logFileName != "" { if err := logutil.ConfigurePersistentLogging(logFileName); err != nil { log.WithError(err).Error("Failed to configuring logging to disk.") } } runtime.GOMAXPROCS(runtime.NumCPU()) return debug.Setup(ctx) } app.After = func(ctx *cli.Context) error { debug.Exit(ctx) return nil } defer func() { if x := recover(); x != nil { log.Errorf("Runtime panic: %v\n%v", x, string(runtimeDebug.Stack())) panic(x) } }() if err := app.Run(os.Args); err != nil { log.Error(err.Error()) os.Exit(1) } }