mirror of
https://gitlab.com/pulsechaincom/prysm-pulse.git
synced 2025-01-08 02:31:19 +00:00
7f443e8387
* add latest changes * fix it * add multiclient support * fix tests * Apply suggestions from code review * fix test Co-authored-by: Raul Jordan <raul@prysmaticlabs.com> Co-authored-by: prylabs-bulldozer[bot] <58059840+prylabs-bulldozer[bot]@users.noreply.github.com>
232 lines
6.6 KiB
Go
232 lines
6.6 KiB
Go
package eth1
|
|
|
|
import (
|
|
"context"
|
|
"encoding/hex"
|
|
"fmt"
|
|
"os"
|
|
"path"
|
|
"strconv"
|
|
"strings"
|
|
|
|
"github.com/pkg/errors"
|
|
"github.com/prysmaticlabs/prysm/io/file"
|
|
"github.com/prysmaticlabs/prysm/testing/endtoend/helpers"
|
|
e2e "github.com/prysmaticlabs/prysm/testing/endtoend/params"
|
|
e2etypes "github.com/prysmaticlabs/prysm/testing/endtoend/types"
|
|
proxy "github.com/prysmaticlabs/prysm/testing/middleware/engine-api-proxy"
|
|
log "github.com/sirupsen/logrus"
|
|
)
|
|
|
|
// ProxySet represents a set of proxies for the engine-api.
|
|
type ProxySet struct {
|
|
e2etypes.ComponentRunner
|
|
started chan struct{}
|
|
proxies []e2etypes.ComponentRunner
|
|
}
|
|
|
|
// NewProxySet creates and returns a set of engine-api proxies.
|
|
func NewProxySet() *ProxySet {
|
|
return &ProxySet{
|
|
started: make(chan struct{}, 1),
|
|
}
|
|
}
|
|
|
|
// Start starts all the proxies in set.
|
|
func (s *ProxySet) Start(ctx context.Context) error {
|
|
|
|
totalNodeCount := e2e.TestParams.BeaconNodeCount + e2e.TestParams.LighthouseBeaconNodeCount
|
|
nodes := make([]e2etypes.ComponentRunner, totalNodeCount)
|
|
for i := 0; i < totalNodeCount; i++ {
|
|
// We start indexing nodes from 1 because the miner has an implicit 0 index.
|
|
nodes[i] = NewProxy(i)
|
|
}
|
|
s.proxies = nodes
|
|
|
|
// Wait for all nodes to finish their job (blocking).
|
|
// Once nodes are ready passed in handler function will be called.
|
|
return helpers.WaitOnNodes(ctx, nodes, func() {
|
|
// All nodes started, close channel, so that all services waiting on a set, can proceed.
|
|
close(s.started)
|
|
})
|
|
}
|
|
|
|
// Started checks whether proxy set is started and all proxies are ready to be queried.
|
|
func (s *ProxySet) Started() <-chan struct{} {
|
|
return s.started
|
|
}
|
|
|
|
// Pause pauses the component and its underlying process.
|
|
func (s *ProxySet) Pause() error {
|
|
for _, n := range s.proxies {
|
|
if err := n.Pause(); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Resume resumes the component and its underlying process.
|
|
func (s *ProxySet) Resume() error {
|
|
for _, n := range s.proxies {
|
|
if err := n.Resume(); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Stop stops the component and its underlying process.
|
|
func (s *ProxySet) Stop() error {
|
|
for _, n := range s.proxies {
|
|
if err := n.Stop(); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// PauseAtIndex pauses the component and its underlying process at the desired index.
|
|
func (s *ProxySet) PauseAtIndex(i int) error {
|
|
if i >= len(s.proxies) {
|
|
return errors.Errorf("provided index exceeds slice size: %d >= %d", i, len(s.proxies))
|
|
}
|
|
return s.proxies[i].Pause()
|
|
}
|
|
|
|
// ResumeAtIndex resumes the component and its underlying process at the desired index.
|
|
func (s *ProxySet) ResumeAtIndex(i int) error {
|
|
if i >= len(s.proxies) {
|
|
return errors.Errorf("provided index exceeds slice size: %d >= %d", i, len(s.proxies))
|
|
}
|
|
return s.proxies[i].Resume()
|
|
}
|
|
|
|
// StopAtIndex stops the component and its underlying process at the desired index.
|
|
func (s *ProxySet) StopAtIndex(i int) error {
|
|
if i >= len(s.proxies) {
|
|
return errors.Errorf("provided index exceeds slice size: %d >= %d", i, len(s.proxies))
|
|
}
|
|
return s.proxies[i].Stop()
|
|
}
|
|
|
|
// ComponentAtIndex returns the component at the provided index.
|
|
func (s *ProxySet) ComponentAtIndex(i int) (e2etypes.ComponentRunner, error) {
|
|
if i >= len(s.proxies) {
|
|
return nil, errors.Errorf("provided index exceeds slice size: %d >= %d", i, len(s.proxies))
|
|
}
|
|
return s.proxies[i], nil
|
|
}
|
|
|
|
// Proxy represents an engine-api proxy.
|
|
type Proxy struct {
|
|
e2etypes.ComponentRunner
|
|
started chan struct{}
|
|
index int
|
|
engineProxy *proxy.Proxy
|
|
cancel func()
|
|
}
|
|
|
|
// NewProxy creates and returns an engine-api proxy.
|
|
func NewProxy(index int) *Proxy {
|
|
return &Proxy{
|
|
started: make(chan struct{}, 1),
|
|
index: index,
|
|
}
|
|
}
|
|
|
|
// Start runs a proxy.
|
|
func (node *Proxy) Start(ctx context.Context) error {
|
|
file, err := os.Create(path.Join(e2e.TestParams.LogPath, "eth1_proxy_"+strconv.Itoa(node.index)+".log"))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
jwtPath := path.Join(e2e.TestParams.TestPath, "eth1data/"+strconv.Itoa(node.index)+"/")
|
|
if node.index == 0 {
|
|
jwtPath = path.Join(e2e.TestParams.TestPath, "eth1data/miner/")
|
|
}
|
|
jwtPath = path.Join(jwtPath, "geth/jwtsecret")
|
|
secret, err := parseJWTSecretFromFile(jwtPath)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
opts := []proxy.Option{
|
|
proxy.WithDestinationAddress(fmt.Sprintf("http://127.0.0.1:%d", e2e.TestParams.Ports.Eth1AuthRPCPort+node.index)),
|
|
proxy.WithPort(e2e.TestParams.Ports.Eth1ProxyPort + node.index),
|
|
proxy.WithLogger(log.New()),
|
|
proxy.WithLogFile(file),
|
|
proxy.WithJwtSecret(string(secret)),
|
|
}
|
|
nProxy, err := proxy.New(opts...)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
log.Infof("Starting eth1 proxy %d with port: %d and file %s", node.index, e2e.TestParams.Ports.Eth1ProxyPort+node.index, file.Name())
|
|
|
|
// Set cancel into context.
|
|
ctx, cancel := context.WithCancel(ctx)
|
|
node.cancel = cancel
|
|
node.engineProxy = nProxy
|
|
// Mark node as ready.
|
|
close(node.started)
|
|
return nProxy.Start(ctx)
|
|
}
|
|
|
|
// Started checks whether the eth1 proxy is started and ready to be queried.
|
|
func (node *Proxy) Started() <-chan struct{} {
|
|
return node.started
|
|
}
|
|
|
|
// Pause pauses the component and its underlying process.
|
|
func (node *Proxy) Pause() error {
|
|
// no-op
|
|
return nil
|
|
}
|
|
|
|
// Resume resumes the component and its underlying process.
|
|
func (node *Proxy) Resume() error {
|
|
// no-op
|
|
return nil
|
|
}
|
|
|
|
// Stop kills the component and its underlying process.
|
|
func (node *Proxy) Stop() error {
|
|
node.cancel()
|
|
return nil
|
|
}
|
|
|
|
// AddRequestInterceptor adds in a json-rpc request interceptor.
|
|
func (node *Proxy) AddRequestInterceptor(rpcMethodName string, responseGen func() interface{}, trigger func() bool) {
|
|
node.engineProxy.AddRequestInterceptor(rpcMethodName, responseGen, trigger)
|
|
}
|
|
|
|
// RemoveRequestInterceptor removes the request interceptor for the provided method.
|
|
func (node *Proxy) RemoveRequestInterceptor(rpcMethodName string) {
|
|
node.engineProxy.RemoveRequestInterceptor(rpcMethodName)
|
|
}
|
|
|
|
// ReleaseBackedUpRequests releases backed up http requests which
|
|
// were previously ignored due to our interceptors.
|
|
func (node *Proxy) ReleaseBackedUpRequests(rpcMethodName string) {
|
|
node.engineProxy.ReleaseBackedUpRequests(rpcMethodName)
|
|
}
|
|
|
|
func parseJWTSecretFromFile(jwtSecretFile string) ([]byte, error) {
|
|
enc, err := file.ReadFileAsBytes(jwtSecretFile)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
strData := strings.TrimSpace(string(enc))
|
|
if len(strData) == 0 {
|
|
return nil, fmt.Errorf("provided JWT secret in file %s cannot be empty", jwtSecretFile)
|
|
}
|
|
secret, err := hex.DecodeString(strings.TrimPrefix(strData, "0x"))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if len(secret) < 32 {
|
|
return nil, errors.New("provided JWT secret should be a hex string of at least 32 bytes")
|
|
}
|
|
return secret, nil
|
|
}
|