mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2025-01-07 02:02:18 +00:00
493a7179d7
* wip * adding deneb block * adding in support for blobs and fixing unit tests for deneb * fixing linting * gaz * adding support for new web3signer version * fixing tag name * addressing feedback * fixing tests * adding unit test for review * updating test name * updating unit tests and length logic * adding in lengthfor root * adjusting max blob length * fixing mock * fixing another mock * gaz * adding network configs * removing duplicate * changing based on nishant's feedback * Update validator/keymanager/remote-web3signer/v1/requests.go Co-authored-by: Sammy Rosso <15244892+saolyn@users.noreply.github.com> * Update validator/keymanager/remote-web3signer/metrics.go Co-authored-by: Sammy Rosso <15244892+saolyn@users.noreply.github.com> * sammy's suggestions * removing temp file --------- Co-authored-by: Nishant Das <nishdas93@gmail.com> Co-authored-by: Sammy Rosso <15244892+saolyn@users.noreply.github.com> Co-authored-by: prylabs-bulldozer[bot] <58059840+prylabs-bulldozer[bot]@users.noreply.github.com>
280 lines
7.4 KiB
Go
280 lines
7.4 KiB
Go
package components
|
|
|
|
import (
|
|
"context"
|
|
"encoding/hex"
|
|
"encoding/json"
|
|
"fmt"
|
|
"io"
|
|
"net/http"
|
|
"os"
|
|
"os/exec"
|
|
"path"
|
|
"path/filepath"
|
|
"strings"
|
|
"syscall"
|
|
"time"
|
|
|
|
"github.com/bazelbuild/rules_go/go/tools/bazel"
|
|
"github.com/ethereum/go-ethereum/common/hexutil"
|
|
"github.com/pkg/errors"
|
|
"github.com/prysmaticlabs/prysm/v4/config/params"
|
|
"github.com/prysmaticlabs/prysm/v4/crypto/bls"
|
|
"github.com/prysmaticlabs/prysm/v4/io/file"
|
|
"github.com/prysmaticlabs/prysm/v4/runtime/interop"
|
|
e2e "github.com/prysmaticlabs/prysm/v4/testing/endtoend/params"
|
|
e2etypes "github.com/prysmaticlabs/prysm/v4/testing/endtoend/types"
|
|
"gopkg.in/yaml.v2"
|
|
)
|
|
|
|
const Web3RemoteSignerPort = 9000
|
|
|
|
var _ e2etypes.ComponentRunner = (*Web3RemoteSigner)(nil)
|
|
|
|
// rawKeyFile used for consensys's web3signer config files.
|
|
// See: https://docs.web3signer.consensys.net/en/latest/Reference/Key-Configuration-Files/#raw-unencrypted-files
|
|
type rawKeyFile struct {
|
|
Type string `yaml:"type"` // always "file-raw" for this test.
|
|
KeyType string `yaml:"keyType"` // always "BLS" for this test.
|
|
PrivateKey string `yaml:"privateKey"` // hex encoded private key with 0x prefix.
|
|
}
|
|
|
|
type Web3RemoteSigner struct {
|
|
ctx context.Context
|
|
started chan struct{}
|
|
cmd *exec.Cmd
|
|
}
|
|
|
|
func NewWeb3RemoteSigner() *Web3RemoteSigner {
|
|
return &Web3RemoteSigner{
|
|
started: make(chan struct{}, 1),
|
|
}
|
|
}
|
|
|
|
// Start the web3remotesigner component with a keystore populated with the deterministic validator
|
|
// keys.
|
|
func (w *Web3RemoteSigner) Start(ctx context.Context) error {
|
|
w.ctx = ctx
|
|
|
|
binaryPath, found := bazel.FindBinary("", "web3signer")
|
|
if !found {
|
|
return errors.New("web3signer binary not found")
|
|
}
|
|
|
|
keystorePath := path.Join(bazel.TestTmpDir(), "web3signerkeystore")
|
|
if err := writeKeystoreKeys(ctx, keystorePath, params.BeaconConfig().MinGenesisActiveValidatorCount); err != nil {
|
|
return err
|
|
}
|
|
websignerDataDir := path.Join(bazel.TestTmpDir(), "web3signerdata")
|
|
if err := os.MkdirAll(websignerDataDir, 0750); err != nil {
|
|
return err
|
|
}
|
|
|
|
testDir, err := createTestnetDir()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
network := "minimal"
|
|
if len(testDir) > 0 {
|
|
// A file path to yaml config file is acceptable network argument.
|
|
network = testDir
|
|
}
|
|
|
|
args := []string{
|
|
// Global flags
|
|
fmt.Sprintf("--key-store-path=%s", keystorePath),
|
|
fmt.Sprintf("--data-path=%s", websignerDataDir),
|
|
fmt.Sprintf("--http-listen-port=%d", Web3RemoteSignerPort),
|
|
"--logging=ALL",
|
|
// Command
|
|
"eth2",
|
|
// Command flags
|
|
"--network=" + network,
|
|
"--slashing-protection-enabled=false", // Otherwise, a postgres DB is required.
|
|
"--key-manager-api-enabled=true",
|
|
}
|
|
|
|
cmd := exec.CommandContext(ctx, binaryPath, args...) // #nosec G204 -- Test code is safe to do this.
|
|
w.cmd = cmd
|
|
// Write stderr to log files.
|
|
stderr, err := os.Create(path.Join(e2e.TestParams.LogPath, "web3signer.stderr.log"))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer func() {
|
|
if err := stderr.Close(); err != nil {
|
|
log.WithError(err).Error("Failed to close stderr file")
|
|
}
|
|
}()
|
|
cmd.Stderr = stderr
|
|
|
|
log.Infof("Starting web3signer with flags: %s %s", binaryPath, strings.Join(args, " "))
|
|
if err = cmd.Start(); err != nil {
|
|
return err
|
|
}
|
|
|
|
go w.monitorStart()
|
|
|
|
return cmd.Wait()
|
|
}
|
|
|
|
func (w *Web3RemoteSigner) Started() <-chan struct{} {
|
|
return w.started
|
|
}
|
|
|
|
// Pause pauses the component and its underlying process.
|
|
func (w *Web3RemoteSigner) Pause() error {
|
|
return w.cmd.Process.Signal(syscall.SIGSTOP)
|
|
}
|
|
|
|
// Resume resumes the component and its underlying process.
|
|
func (w *Web3RemoteSigner) Resume() error {
|
|
return w.cmd.Process.Signal(syscall.SIGCONT)
|
|
}
|
|
|
|
// Stop stops the component and its underlying process.
|
|
func (w *Web3RemoteSigner) Stop() error {
|
|
return w.cmd.Process.Kill()
|
|
}
|
|
|
|
// monitorStart by polling server until it returns a 200 at /upcheck.
|
|
func (w *Web3RemoteSigner) monitorStart() {
|
|
client := &http.Client{}
|
|
for {
|
|
req, err := http.NewRequestWithContext(w.ctx, "GET", fmt.Sprintf("http://localhost:%d/upcheck", Web3RemoteSignerPort), nil)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
res, err := client.Do(req)
|
|
_ = err
|
|
if res != nil && res.StatusCode == 200 {
|
|
close(w.started)
|
|
return
|
|
}
|
|
time.Sleep(time.Second)
|
|
}
|
|
}
|
|
|
|
func (w *Web3RemoteSigner) wait(ctx context.Context) {
|
|
select {
|
|
case <-ctx.Done():
|
|
return
|
|
case <-w.ctx.Done():
|
|
return
|
|
case <-w.started:
|
|
return
|
|
}
|
|
}
|
|
|
|
// PublicKeys queries the web3signer and returns the response keys.
|
|
func (w *Web3RemoteSigner) PublicKeys(ctx context.Context) ([]bls.PublicKey, error) {
|
|
w.wait(ctx)
|
|
|
|
client := &http.Client{}
|
|
req, err := http.NewRequestWithContext(ctx, "GET", fmt.Sprintf("http://localhost:%d/api/v1/eth2/publicKeys", Web3RemoteSignerPort), nil)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
res, err := client.Do(req)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if res.StatusCode != 200 {
|
|
return nil, fmt.Errorf("returned status code %d", res.StatusCode)
|
|
}
|
|
b, err := io.ReadAll(res.Body)
|
|
if err != nil {
|
|
return nil, err
|
|
} else if len(b) == 0 {
|
|
return nil, errors.New("no response body")
|
|
}
|
|
var keys []string
|
|
if err := json.Unmarshal(b, &keys); err != nil {
|
|
return nil, err
|
|
}
|
|
if len(keys) == 0 {
|
|
return nil, errors.New("no keys returned")
|
|
}
|
|
|
|
pks := make([]bls.PublicKey, 0, len(keys))
|
|
for _, key := range keys {
|
|
if ctx.Err() != nil {
|
|
return nil, ctx.Err()
|
|
}
|
|
raw, err := hexutil.Decode(key)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
pk, err := bls.PublicKeyFromBytes(raw)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
pks = append(pks, pk)
|
|
}
|
|
return pks, nil
|
|
}
|
|
|
|
func writeKeystoreKeys(ctx context.Context, keystorePath string, numKeys uint64) error {
|
|
if err := os.MkdirAll(keystorePath, 0750); err != nil {
|
|
return err
|
|
}
|
|
|
|
priv, pub, err := interop.DeterministicallyGenerateKeys(0, numKeys)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
for i, p := range pub {
|
|
log.Infof("web3signer file added %s, key index %v", hexutil.Encode(p.Marshal()), i)
|
|
}
|
|
for i, pk := range priv {
|
|
if ctx.Err() != nil {
|
|
return ctx.Err()
|
|
}
|
|
rkf := &rawKeyFile{
|
|
Type: "file-raw",
|
|
KeyType: "BLS",
|
|
PrivateKey: hexutil.Encode(pk.Marshal()),
|
|
}
|
|
b, err := yaml.Marshal(rkf)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if err := os.WriteFile(path.Join(keystorePath, fmt.Sprintf("key-0x%s.yaml", hex.EncodeToString(pub[i].Marshal()))), b, 0600); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (w *Web3RemoteSigner) UnderlyingProcess() *os.Process {
|
|
return w.cmd.Process
|
|
}
|
|
|
|
func createTestnetDir() (string, error) {
|
|
testNetDir := e2e.TestParams.TestPath + "/web3signer-testnet"
|
|
configPath := filepath.Join(testNetDir, "config.yaml")
|
|
rawYaml := params.ConfigToYaml(params.BeaconConfig())
|
|
|
|
// Add in deposit contract in yaml
|
|
depContractStr := fmt.Sprintf("\nDEPOSIT_CONTRACT_ADDRESS: %s\n", params.BeaconConfig().DepositContractAddress)
|
|
rawYaml = append(rawYaml, []byte(depContractStr)...)
|
|
rawYaml = append(rawYaml, params.NetworkConfigToYaml(params.BeaconNetworkConfig())...)
|
|
|
|
rawYaml = append(rawYaml, []byte("\nEPOCHS_PER_SUBNET_SUBSCRIPTION: 256\n")...)
|
|
rawYaml = append(rawYaml, []byte("\nMIN_EPOCHS_FOR_BLOCK_REQUESTS: 33024\n")...)
|
|
rawYaml = append(rawYaml, []byte("\nSUBNETS_PER_NODE: 2\n")...)
|
|
rawYaml = append(rawYaml, []byte("\nATTESTATION_SUBNET_EXTRA_BITS: 0\n")...)
|
|
rawYaml = append(rawYaml, []byte("\nATTESTATION_SUBNET_PREFIX_BITS: 6\n")...)
|
|
|
|
if err := file.MkdirAll(testNetDir); err != nil {
|
|
return "", err
|
|
}
|
|
if err := file.WriteFile(configPath, rawYaml); err != nil {
|
|
return "", err
|
|
}
|
|
|
|
return configPath, nil
|
|
}
|