mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2024-12-25 04:47:18 +00:00
551b03d6e6
* more descriptive password validation error * include change wallet password fixes * balance and jwt improvements * allow for different wallet dirs specified on startup * ensure wallet password is always validated * fix up prysm tests * gaz * test pass * pass balances tests * wrap up fixes * radek feedback * fix up tests * cors fix * add tests for validator status * pass tests * fix n * skip content type test * package level cache and send over feed * package level cache for derived * all tests passing * gofmt Co-authored-by: Preston Van Loon <preston@prysmaticlabs.com> Co-authored-by: prylabs-bulldozer[bot] <58059840+prylabs-bulldozer[bot]@users.noreply.github.com>
175 lines
5.2 KiB
Go
175 lines
5.2 KiB
Go
package rpc
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"net"
|
|
|
|
middleware "github.com/grpc-ecosystem/go-grpc-middleware"
|
|
recovery "github.com/grpc-ecosystem/go-grpc-middleware/recovery"
|
|
grpc_opentracing "github.com/grpc-ecosystem/go-grpc-middleware/tracing/opentracing"
|
|
grpc_prometheus "github.com/grpc-ecosystem/go-grpc-prometheus"
|
|
pb "github.com/prysmaticlabs/prysm/proto/validator/accounts/v2"
|
|
"github.com/prysmaticlabs/prysm/shared/event"
|
|
"github.com/prysmaticlabs/prysm/shared/rand"
|
|
"github.com/prysmaticlabs/prysm/shared/traceutil"
|
|
v2 "github.com/prysmaticlabs/prysm/validator/accounts/v2/wallet"
|
|
"github.com/prysmaticlabs/prysm/validator/client"
|
|
"github.com/prysmaticlabs/prysm/validator/db"
|
|
v2keymanager "github.com/prysmaticlabs/prysm/validator/keymanager/v2"
|
|
"github.com/sirupsen/logrus"
|
|
"go.opencensus.io/plugin/ocgrpc"
|
|
"google.golang.org/grpc"
|
|
"google.golang.org/grpc/credentials"
|
|
"google.golang.org/grpc/reflection"
|
|
)
|
|
|
|
var log logrus.FieldLogger
|
|
|
|
func init() {
|
|
log = logrus.WithField("prefix", "rpc")
|
|
}
|
|
|
|
// Config options for the gRPC server.
|
|
type Config struct {
|
|
Host string
|
|
Port string
|
|
CertFlag string
|
|
KeyFlag string
|
|
ValDB db.Database
|
|
WalletDir string
|
|
ValidatorService *client.ValidatorService
|
|
SyncChecker client.SyncChecker
|
|
GenesisFetcher client.GenesisFetcher
|
|
WalletInitializedFeed *event.Feed
|
|
NodeGatewayEndpoint string
|
|
}
|
|
|
|
// Server defining a gRPC server for the remote signer API.
|
|
type Server struct {
|
|
valDB db.Database
|
|
ctx context.Context
|
|
cancel context.CancelFunc
|
|
host string
|
|
port string
|
|
listener net.Listener
|
|
keymanager v2keymanager.IKeymanager
|
|
withCert string
|
|
withKey string
|
|
credentialError error
|
|
grpcServer *grpc.Server
|
|
jwtKey []byte
|
|
validatorService *client.ValidatorService
|
|
syncChecker client.SyncChecker
|
|
genesisFetcher client.GenesisFetcher
|
|
walletDir string
|
|
wallet *v2.Wallet
|
|
walletInitializedFeed *event.Feed
|
|
walletInitialized bool
|
|
nodeGatewayEndpoint string
|
|
}
|
|
|
|
// NewServer instantiates a new gRPC server.
|
|
func NewServer(ctx context.Context, cfg *Config) *Server {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
return &Server{
|
|
ctx: ctx,
|
|
cancel: cancel,
|
|
host: cfg.Host,
|
|
port: cfg.Port,
|
|
withCert: cfg.CertFlag,
|
|
withKey: cfg.KeyFlag,
|
|
valDB: cfg.ValDB,
|
|
validatorService: cfg.ValidatorService,
|
|
syncChecker: cfg.SyncChecker,
|
|
genesisFetcher: cfg.GenesisFetcher,
|
|
walletDir: cfg.WalletDir,
|
|
walletInitializedFeed: cfg.WalletInitializedFeed,
|
|
walletInitialized: false,
|
|
nodeGatewayEndpoint: cfg.NodeGatewayEndpoint,
|
|
}
|
|
}
|
|
|
|
// Start the gRPC server.
|
|
func (s *Server) Start() {
|
|
// Setup the gRPC server options and TLS configuration.
|
|
address := fmt.Sprintf("%s:%s", s.host, s.port)
|
|
lis, err := net.Listen("tcp", address)
|
|
if err != nil {
|
|
log.Errorf("Could not listen to port in Start() %s: %v", address, err)
|
|
}
|
|
s.listener = lis
|
|
|
|
// Register interceptors for metrics gathering as well as our
|
|
// own, custom JWT unary interceptor.
|
|
opts := []grpc.ServerOption{
|
|
grpc.StatsHandler(&ocgrpc.ServerHandler{}),
|
|
grpc.UnaryInterceptor(middleware.ChainUnaryServer(
|
|
recovery.UnaryServerInterceptor(
|
|
recovery.WithRecoveryHandlerContext(traceutil.RecoveryHandlerFunc),
|
|
),
|
|
grpc_prometheus.UnaryServerInterceptor,
|
|
grpc_opentracing.UnaryServerInterceptor(),
|
|
s.JWTInterceptor(),
|
|
)),
|
|
}
|
|
grpc_prometheus.EnableHandlingTimeHistogram()
|
|
|
|
if s.withCert != "" && s.withKey != "" {
|
|
creds, err := credentials.NewServerTLSFromFile(s.withCert, s.withKey)
|
|
if err != nil {
|
|
log.Errorf("Could not load TLS keys: %s", err)
|
|
s.credentialError = err
|
|
}
|
|
opts = append(opts, grpc.Creds(creds))
|
|
log.WithFields(logrus.Fields{
|
|
"crt-path": s.withCert,
|
|
"key-path": s.withKey,
|
|
}).Info("Loaded TLS certificates")
|
|
}
|
|
s.grpcServer = grpc.NewServer(opts...)
|
|
|
|
// We create a new, random JWT key upon validator startup.
|
|
r := rand.NewGenerator()
|
|
jwtKey := make([]byte, 32)
|
|
n, err := r.Read(jwtKey)
|
|
if err != nil {
|
|
log.WithError(err).Fatal("Could not initialize validator jwt key")
|
|
}
|
|
if n != len(jwtKey) {
|
|
log.WithError(err).Fatal("Could not create random jwt key for validator")
|
|
}
|
|
s.jwtKey = jwtKey
|
|
|
|
// Register services available for the gRPC server.
|
|
reflection.Register(s.grpcServer)
|
|
pb.RegisterAuthServer(s.grpcServer, s)
|
|
pb.RegisterWalletServer(s.grpcServer, s)
|
|
pb.RegisterHealthServer(s.grpcServer, s)
|
|
pb.RegisterAccountsServer(s.grpcServer, s)
|
|
|
|
go func() {
|
|
if s.listener != nil {
|
|
if err := s.grpcServer.Serve(s.listener); err != nil {
|
|
log.Errorf("Could not serve: %v", err)
|
|
}
|
|
}
|
|
}()
|
|
log.WithField("address", address).Info("gRPC server listening on address")
|
|
}
|
|
|
|
// Stop the gRPC server.
|
|
func (s *Server) Stop() error {
|
|
s.cancel()
|
|
if s.listener != nil {
|
|
s.grpcServer.GracefulStop()
|
|
log.Debug("Initiated graceful stop of server")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Status returns nil or credentialError.
|
|
func (s *Server) Status() error {
|
|
return s.credentialError
|
|
}
|