// Package kv defines a persistent backend for the validator service. package kv import ( "context" "os" "path/filepath" "time" "github.com/pkg/errors" "github.com/prometheus/client_golang/prometheus" prombolt "github.com/prysmaticlabs/prombbolt" "github.com/prysmaticlabs/prysm/shared/event" "github.com/prysmaticlabs/prysm/shared/fileutil" "github.com/prysmaticlabs/prysm/shared/params" bolt "go.etcd.io/bbolt" ) const ( // Number of attestation records we can hold in memory // before we flush them to the database. Roughly corresponds // to the max number of keys per validator client, but there is no // detriment if there are more keys than this capacity, as attestations // for those keys will simply be flushed at the next flush interval. attestationBatchCapacity = 2048 // Time interval after which we flush attestation records to the database // from a batch kept in memory for slashing protection. attestationBatchWriteInterval = time.Millisecond * 100 ) // ProtectionDbFileName Validator slashing protection db file name. var ( ProtectionDbFileName = "validator.db" ) // Store defines an implementation of the Prysm Database interface // using BoltDB as the underlying persistent kv-store for eth2. type Store struct { db *bolt.DB databasePath string batchedAttestations []*attestationRecord batchedAttestationsChan chan *attestationRecord batchAttestationsFlushedFeed *event.Feed } // Close closes the underlying boltdb database. func (store *Store) Close() error { prometheus.Unregister(createBoltCollector(store.db)) return store.db.Close() } func (store *Store) update(fn func(*bolt.Tx) error) error { return store.db.Update(fn) } func (store *Store) view(fn func(*bolt.Tx) error) error { return store.db.View(fn) } // ClearDB removes any previously stored data at the configured data directory. func (store *Store) ClearDB() error { if _, err := os.Stat(store.databasePath); os.IsNotExist(err) { return nil } prometheus.Unregister(createBoltCollector(store.db)) return os.Remove(filepath.Join(store.databasePath, ProtectionDbFileName)) } // DatabasePath at which this database writes files. func (store *Store) DatabasePath() string { return store.databasePath } func createBuckets(tx *bolt.Tx, buckets ...[]byte) error { for _, bucket := range buckets { if _, err := tx.CreateBucketIfNotExists(bucket); err != nil { return err } } return nil } // NewKVStore initializes a new boltDB key-value store at the directory // path specified, creates the kv-buckets based on the schema, and stores // an open connection db object as a property of the Store struct. func NewKVStore(ctx context.Context, dirPath string, pubKeys [][48]byte) (*Store, error) { hasDir, err := fileutil.HasDir(dirPath) if err != nil { return nil, err } if !hasDir { if err := fileutil.MkdirAll(dirPath); err != nil { return nil, err } } datafile := filepath.Join(dirPath, ProtectionDbFileName) boltDB, err := bolt.Open(datafile, params.BeaconIoConfig().ReadWritePermissions, &bolt.Options{Timeout: params.BeaconIoConfig().BoltTimeout}) if err != nil { if errors.Is(err, bolt.ErrTimeout) { return nil, errors.New("cannot obtain database lock, database may be in use by another process") } return nil, err } kv := &Store{ db: boltDB, databasePath: dirPath, batchedAttestations: make([]*attestationRecord, 0, attestationBatchCapacity), batchedAttestationsChan: make(chan *attestationRecord, attestationBatchCapacity), batchAttestationsFlushedFeed: new(event.Feed), } if err := kv.db.Update(func(tx *bolt.Tx) error { return createBuckets( tx, genesisInfoBucket, historicAttestationsBucket, historicProposalsBucket, lowestSignedSourceBucket, lowestSignedTargetBucket, lowestSignedProposalsBucket, highestSignedProposalsBucket, pubKeysBucket, migrationsBucket, ) }); err != nil { return nil, err } // Initialize the required public keys into the DB to ensure they're not empty. if pubKeys != nil { if err := kv.UpdatePublicKeysBuckets(pubKeys); err != nil { return nil, err } } // Perform a special migration to an optimal attester protection DB schema. if err := kv.migrateOptimalAttesterProtection(ctx); err != nil { return nil, errors.Wrap(err, "could not migrate attester protection to more efficient format") } // Prune attesting records older than the current weak subjectivity period. if err := kv.PruneAttestationsOlderThanCurrentWeakSubjectivity(ctx); err != nil { return nil, errors.Wrap(err, "could not prune old attestations from DB") } // Batch save attestation records for slashing protection at timed // intervals to our database. go kv.batchAttestationWrites(ctx) return kv, prometheus.Register(createBoltCollector(kv.db)) } // UpdatePublicKeysBuckets for a specified list of keys. func (store *Store) UpdatePublicKeysBuckets(pubKeys [][48]byte) error { return store.update(func(tx *bolt.Tx) error { bucket := tx.Bucket(historicProposalsBucket) for _, pubKey := range pubKeys { if _, err := bucket.CreateBucketIfNotExists(pubKey[:]); err != nil { return errors.Wrap(err, "failed to create proposal history bucket") } } return nil }) } // Size returns the db size in bytes. func (store *Store) Size() (int64, error) { var size int64 err := store.db.View(func(tx *bolt.Tx) error { size = tx.Size() return nil }) return size, err } // createBoltCollector returns a prometheus collector specifically configured for boltdb. func createBoltCollector(db *bolt.DB) prometheus.Collector { return prombolt.New("boltDB", db) }