mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2025-01-11 12:10:05 +00:00
c632b96454
* Starting * Update logging for service * Update logging for assignment * Update logging for attest * Update logging for propose * Update logging for balance update * Final touchup * Fixed test * Fixed test * Feedback * Fix * Fix all the tests
126 lines
3.6 KiB
Go
126 lines
3.6 KiB
Go
package client
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
|
|
middleware "github.com/grpc-ecosystem/go-grpc-middleware"
|
|
grpc_opentracing "github.com/grpc-ecosystem/go-grpc-middleware/tracing/opentracing"
|
|
"github.com/pkg/errors"
|
|
pb "github.com/prysmaticlabs/prysm/proto/beacon/rpc/v1"
|
|
"github.com/prysmaticlabs/prysm/shared/bytesutil"
|
|
"github.com/prysmaticlabs/prysm/shared/keystore"
|
|
"github.com/sirupsen/logrus"
|
|
"go.opencensus.io/plugin/ocgrpc"
|
|
"google.golang.org/grpc"
|
|
"google.golang.org/grpc/credentials"
|
|
)
|
|
|
|
var log = logrus.WithField("prefix", "validator")
|
|
|
|
// ValidatorService represents a service to manage the validator client
|
|
// routine.
|
|
type ValidatorService struct {
|
|
ctx context.Context
|
|
cancel context.CancelFunc
|
|
validator Validator
|
|
conn *grpc.ClientConn
|
|
endpoint string
|
|
withCert string
|
|
keys map[string]*keystore.Key
|
|
logValidatorBalances bool
|
|
}
|
|
|
|
// Config for the validator service.
|
|
type Config struct {
|
|
Endpoint string
|
|
CertFlag string
|
|
Keys map[string]*keystore.Key
|
|
LogValidatorBalances bool
|
|
}
|
|
|
|
// NewValidatorService creates a new validator service for the service
|
|
// registry.
|
|
func NewValidatorService(ctx context.Context, cfg *Config) (*ValidatorService, error) {
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
return &ValidatorService{
|
|
ctx: ctx,
|
|
cancel: cancel,
|
|
endpoint: cfg.Endpoint,
|
|
withCert: cfg.CertFlag,
|
|
keys: cfg.Keys,
|
|
logValidatorBalances: cfg.LogValidatorBalances,
|
|
}, nil
|
|
}
|
|
|
|
// Start the validator service. Launches the main go routine for the validator
|
|
// client.
|
|
func (v *ValidatorService) Start() {
|
|
pubkeys := make([][]byte, 0)
|
|
for i := range v.keys {
|
|
pubkey := v.keys[i].PublicKey.Marshal()
|
|
log.WithField("pubKey", fmt.Sprintf("%#x", bytesutil.Trunc(pubkey))).Info("New validator service")
|
|
pubkeys = append(pubkeys, pubkey)
|
|
}
|
|
|
|
var dialOpt grpc.DialOption
|
|
if v.withCert != "" {
|
|
creds, err := credentials.NewClientTLSFromFile(v.withCert, "")
|
|
if err != nil {
|
|
log.Errorf("Could not get valid credentials: %v", err)
|
|
return
|
|
}
|
|
dialOpt = grpc.WithTransportCredentials(creds)
|
|
} else {
|
|
dialOpt = grpc.WithInsecure()
|
|
log.Warn("You are using an insecure gRPC connection! Please provide a certificate and key to use a secure connection.")
|
|
}
|
|
opts := []grpc.DialOption{
|
|
dialOpt,
|
|
grpc.WithStatsHandler(&ocgrpc.ClientHandler{}),
|
|
grpc.WithStreamInterceptor(middleware.ChainStreamClient(
|
|
grpc_opentracing.StreamClientInterceptor(),
|
|
)),
|
|
grpc.WithUnaryInterceptor(middleware.ChainUnaryClient(
|
|
grpc_opentracing.UnaryClientInterceptor(),
|
|
)),
|
|
}
|
|
conn, err := grpc.DialContext(v.ctx, v.endpoint, opts...)
|
|
if err != nil {
|
|
log.Errorf("Could not dial endpoint: %s, %v", v.endpoint, err)
|
|
return
|
|
}
|
|
log.Info("Successfully started gRPC connection")
|
|
v.conn = conn
|
|
v.validator = &validator{
|
|
validatorClient: pb.NewValidatorServiceClient(v.conn),
|
|
attesterClient: pb.NewAttesterServiceClient(v.conn),
|
|
proposerClient: pb.NewProposerServiceClient(v.conn),
|
|
keys: v.keys,
|
|
pubkeys: pubkeys,
|
|
logValidatorBalances: v.logValidatorBalances,
|
|
prevBalance: make(map[[48]byte]uint64),
|
|
}
|
|
go run(v.ctx, v.validator)
|
|
}
|
|
|
|
// Stop the validator service.
|
|
func (v *ValidatorService) Stop() error {
|
|
v.cancel()
|
|
log.Info("Stopping service")
|
|
if v.conn != nil {
|
|
return v.conn.Close()
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Status ...
|
|
//
|
|
// WIP - not done.
|
|
func (v *ValidatorService) Status() error {
|
|
if v.conn == nil {
|
|
return errors.New("no connection to beacon RPC")
|
|
}
|
|
return nil
|
|
}
|