package main
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"net"
|
|
"net/http"
|
|
"os"
|
|
"path/filepath"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/spf13/viper"
|
|
"google.golang.org/grpc"
|
|
|
|
"github.com/tendermint/tendermint/abci/server"
|
|
"github.com/tendermint/tendermint/config"
|
|
"github.com/tendermint/tendermint/crypto/ed25519"
|
|
tmflags "github.com/tendermint/tendermint/libs/cli/flags"
|
|
"github.com/tendermint/tendermint/libs/log"
|
|
tmnet "github.com/tendermint/tendermint/libs/net"
|
|
"github.com/tendermint/tendermint/light"
|
|
lproxy "github.com/tendermint/tendermint/light/proxy"
|
|
lrpc "github.com/tendermint/tendermint/light/rpc"
|
|
dbs "github.com/tendermint/tendermint/light/store/db"
|
|
"github.com/tendermint/tendermint/node"
|
|
"github.com/tendermint/tendermint/p2p"
|
|
"github.com/tendermint/tendermint/privval"
|
|
grpcprivval "github.com/tendermint/tendermint/privval/grpc"
|
|
privvalproto "github.com/tendermint/tendermint/proto/tendermint/privval"
|
|
"github.com/tendermint/tendermint/proxy"
|
|
rpcserver "github.com/tendermint/tendermint/rpc/jsonrpc/server"
|
|
e2e "github.com/tendermint/tendermint/test/e2e/pkg"
|
|
)
|
|
|
|
var logger = log.NewTMLogger(log.NewSyncWriter(os.Stdout))
|
|
|
|
// main is the binary entrypoint.
|
|
func main() {
|
|
if len(os.Args) != 2 {
|
|
fmt.Printf("Usage: %v <configfile>", os.Args[0])
|
|
return
|
|
}
|
|
configFile := ""
|
|
if len(os.Args) == 2 {
|
|
configFile = os.Args[1]
|
|
}
|
|
|
|
if err := run(configFile); err != nil {
|
|
logger.Error(err.Error())
|
|
os.Exit(1)
|
|
}
|
|
}
|
|
|
|
// run runs the application - basically like main() with error handling.
|
|
func run(configFile string) error {
|
|
cfg, err := LoadConfig(configFile)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Start remote signer (must start before node if running builtin).
|
|
if cfg.PrivValServer != "" {
|
|
if err = startSigner(cfg); err != nil {
|
|
return err
|
|
}
|
|
if cfg.Protocol == "builtin" {
|
|
time.Sleep(1 * time.Second)
|
|
}
|
|
}
|
|
|
|
// Start app server.
|
|
switch cfg.Protocol {
|
|
case "socket", "grpc":
|
|
err = startApp(cfg)
|
|
case "builtin":
|
|
switch cfg.Mode {
|
|
case string(e2e.ModeLight):
|
|
err = startLightNode(cfg)
|
|
case string(e2e.ModeSeed):
|
|
err = startSeedNode(cfg)
|
|
default:
|
|
err = startNode(cfg)
|
|
}
|
|
// FIXME: Temporarily remove maverick until it is redesigned
|
|
// if len(cfg.Misbehaviors) == 0 {
|
|
// err = startMaverick(cfg)
|
|
// }
|
|
default:
|
|
err = fmt.Errorf("invalid protocol %q", cfg.Protocol)
|
|
}
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Apparently there's no way to wait for the server, so we just sleep
|
|
for {
|
|
time.Sleep(1 * time.Hour)
|
|
}
|
|
}
|
|
|
|
// startApp starts the application server, listening for connections from Tendermint.
|
|
func startApp(cfg *Config) error {
|
|
app, err := NewApplication(cfg)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
server, err := server.NewServer(cfg.Listen, cfg.Protocol, app)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
err = server.Start()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
logger.Info(fmt.Sprintf("Server listening on %v (%v protocol)", cfg.Listen, cfg.Protocol))
|
|
return nil
|
|
}
|
|
|
|
// startNode starts a Tendermint node running the application directly. It assumes the Tendermint
|
|
// configuration is in $TMHOME/config/tendermint.toml.
|
|
//
|
|
// FIXME There is no way to simply load the configuration from a file, so we need to pull in Viper.
|
|
func startNode(cfg *Config) error {
|
|
app, err := NewApplication(cfg)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
tmcfg, nodeLogger, nodeKey, err := setupNode()
|
|
if err != nil {
|
|
return fmt.Errorf("failed to setup config: %w", err)
|
|
}
|
|
|
|
pval, err := privval.LoadOrGenFilePV(tmcfg.PrivValidatorKeyFile(), tmcfg.PrivValidatorStateFile())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
n, err := node.NewNode(tmcfg,
|
|
pval,
|
|
*nodeKey,
|
|
proxy.NewLocalClientCreator(app),
|
|
node.DefaultGenesisDocProviderFunc(tmcfg),
|
|
node.DefaultDBProvider,
|
|
node.DefaultMetricsProvider(tmcfg.Instrumentation),
|
|
nodeLogger,
|
|
)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return n.Start()
|
|
}
|
|
|
|
func startSeedNode(cfg *Config) error {
|
|
tmcfg, nodeLogger, nodeKey, err := setupNode()
|
|
if err != nil {
|
|
return fmt.Errorf("failed to setup config: %w", err)
|
|
}
|
|
|
|
n, err := node.NewSeedNode(
|
|
tmcfg,
|
|
*nodeKey,
|
|
node.DefaultGenesisDocProviderFunc(tmcfg),
|
|
nodeLogger,
|
|
)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return n.Start()
|
|
}
|
|
|
|
func startLightNode(cfg *Config) error {
|
|
tmcfg, nodeLogger, _, err := setupNode()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
dbContext := &node.DBContext{ID: "light", Config: tmcfg}
|
|
lightDB, err := node.DefaultDBProvider(dbContext)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
providers := rpcEndpoints(tmcfg.P2P.PersistentPeers)
|
|
|
|
c, err := light.NewHTTPClient(
|
|
context.Background(),
|
|
cfg.ChainID,
|
|
light.TrustOptions{
|
|
Period: tmcfg.StateSync.TrustPeriod,
|
|
Height: tmcfg.StateSync.TrustHeight,
|
|
Hash: tmcfg.StateSync.TrustHashBytes(),
|
|
},
|
|
providers[0],
|
|
providers[1:],
|
|
dbs.New(lightDB),
|
|
light.Logger(nodeLogger),
|
|
)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
rpccfg := rpcserver.DefaultConfig()
|
|
rpccfg.MaxBodyBytes = tmcfg.RPC.MaxBodyBytes
|
|
rpccfg.MaxHeaderBytes = tmcfg.RPC.MaxHeaderBytes
|
|
rpccfg.MaxOpenConnections = tmcfg.RPC.MaxOpenConnections
|
|
// If necessary adjust global WriteTimeout to ensure it's greater than
|
|
// TimeoutBroadcastTxCommit.
|
|
// See https://github.com/tendermint/tendermint/issues/3435
|
|
if rpccfg.WriteTimeout <= tmcfg.RPC.TimeoutBroadcastTxCommit {
|
|
rpccfg.WriteTimeout = tmcfg.RPC.TimeoutBroadcastTxCommit + 1*time.Second
|
|
}
|
|
|
|
p, err := lproxy.NewProxy(c, tmcfg.RPC.ListenAddress, providers[0], rpccfg, nodeLogger,
|
|
lrpc.KeyPathFn(lrpc.DefaultMerkleKeyPathFn()))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
logger.Info("Starting proxy...", "laddr", tmcfg.RPC.ListenAddress)
|
|
if err := p.ListenAndServe(); err != http.ErrServerClosed {
|
|
// Error starting or closing listener:
|
|
logger.Error("proxy ListenAndServe", "err", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// FIXME: Temporarily disconnected maverick until it is redesigned
|
|
// startMaverick starts a Maverick node that runs the application directly. It assumes the Tendermint
|
|
// configuration is in $TMHOME/config/tendermint.toml.
|
|
// func startMaverick(cfg *Config) error {
|
|
// app, err := NewApplication(cfg)
|
|
// if err != nil {
|
|
// return err
|
|
// }
|
|
|
|
// tmcfg, logger, nodeKey, err := setupNode()
|
|
// if err != nil {
|
|
// return fmt.Errorf("failed to setup config: %w", err)
|
|
// }
|
|
|
|
// misbehaviors := make(map[int64]mcs.Misbehavior, len(cfg.Misbehaviors))
|
|
// for heightString, misbehaviorString := range cfg.Misbehaviors {
|
|
// height, _ := strconv.ParseInt(heightString, 10, 64)
|
|
// misbehaviors[height] = mcs.MisbehaviorList[misbehaviorString]
|
|
// }
|
|
|
|
// n, err := maverick.NewNode(tmcfg,
|
|
// maverick.LoadOrGenFilePV(tmcfg.PrivValidatorKeyFile(), tmcfg.PrivValidatorStateFile()),
|
|
// *nodeKey,
|
|
// proxy.NewLocalClientCreator(app),
|
|
// maverick.DefaultGenesisDocProviderFunc(tmcfg),
|
|
// maverick.DefaultDBProvider,
|
|
// maverick.DefaultMetricsProvider(tmcfg.Instrumentation),
|
|
// logger,
|
|
// misbehaviors,
|
|
// )
|
|
// if err != nil {
|
|
// return err
|
|
// }
|
|
|
|
// return n.Start()
|
|
// }
|
|
|
|
// startSigner starts a signer server connecting to the given endpoint.
|
|
func startSigner(cfg *Config) error {
|
|
filePV, err := privval.LoadFilePV(cfg.PrivValKey, cfg.PrivValState)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
protocol, address := tmnet.ProtocolAndAddress(cfg.PrivValServer)
|
|
var dialFn privval.SocketDialer
|
|
switch protocol {
|
|
case "tcp":
|
|
dialFn = privval.DialTCPFn(address, 3*time.Second, ed25519.GenPrivKey())
|
|
case "unix":
|
|
dialFn = privval.DialUnixFn(address)
|
|
case "grpc":
|
|
lis, err := net.Listen("tcp", address)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
ss := grpcprivval.NewSignerServer(cfg.ChainID, filePV, logger)
|
|
|
|
s := grpc.NewServer()
|
|
|
|
privvalproto.RegisterPrivValidatorAPIServer(s, ss)
|
|
|
|
go func() { // no need to clean up since we remove docker containers
|
|
if err := s.Serve(lis); err != nil {
|
|
panic(err)
|
|
}
|
|
}()
|
|
|
|
return nil
|
|
default:
|
|
return fmt.Errorf("invalid privval protocol %q", protocol)
|
|
}
|
|
|
|
endpoint := privval.NewSignerDialerEndpoint(logger, dialFn,
|
|
privval.SignerDialerEndpointRetryWaitInterval(1*time.Second),
|
|
privval.SignerDialerEndpointConnRetries(100))
|
|
err = privval.NewSignerServer(endpoint, cfg.ChainID, filePV).Start()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
logger.Info(fmt.Sprintf("Remote signer connecting to %v", cfg.PrivValServer))
|
|
return nil
|
|
}
|
|
|
|
func setupNode() (*config.Config, log.Logger, *p2p.NodeKey, error) {
|
|
var tmcfg *config.Config
|
|
|
|
home := os.Getenv("TMHOME")
|
|
if home == "" {
|
|
return nil, nil, nil, errors.New("TMHOME not set")
|
|
}
|
|
|
|
viper.AddConfigPath(filepath.Join(home, "config"))
|
|
viper.SetConfigName("config")
|
|
|
|
if err := viper.ReadInConfig(); err != nil {
|
|
return nil, nil, nil, err
|
|
}
|
|
|
|
tmcfg = config.DefaultConfig()
|
|
|
|
if err := viper.Unmarshal(tmcfg); err != nil {
|
|
return nil, nil, nil, err
|
|
}
|
|
|
|
tmcfg.SetRoot(home)
|
|
|
|
if err := tmcfg.ValidateBasic(); err != nil {
|
|
return nil, nil, nil, fmt.Errorf("error in config file: %w", err)
|
|
}
|
|
|
|
if tmcfg.LogFormat == config.LogFormatJSON {
|
|
logger = log.NewTMJSONLogger(log.NewSyncWriter(os.Stdout))
|
|
}
|
|
|
|
nodeLogger, err := tmflags.ParseLogLevel(tmcfg.LogLevel, logger, config.DefaultLogLevel)
|
|
if err != nil {
|
|
return nil, nil, nil, err
|
|
}
|
|
|
|
nodeLogger = nodeLogger.With("module", "main")
|
|
|
|
nodeKey, err := p2p.LoadOrGenNodeKey(tmcfg.NodeKeyFile())
|
|
if err != nil {
|
|
return nil, nil, nil, fmt.Errorf("failed to load or gen node key %s: %w", tmcfg.NodeKeyFile(), err)
|
|
}
|
|
|
|
return tmcfg, nodeLogger, &nodeKey, nil
|
|
}
|
|
|
|
// rpcEndpoints takes a list of persistent peers and splits them into a list of rpc endpoints
|
|
// using 26657 as the port number
|
|
func rpcEndpoints(peers string) []string {
|
|
arr := strings.Split(peers, ",")
|
|
endpoints := make([]string, len(arr))
|
|
for i, v := range arr {
|
|
addr, err := p2p.ParseNodeAddress(v)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
// use RPC port instead
|
|
addr.Port = 26657
|
|
var rpcEndpoint string
|
|
// for ipv6 addresses
|
|
if strings.Contains(addr.Hostname, ":") {
|
|
rpcEndpoint = "http://[" + addr.Hostname + "]:" + fmt.Sprint(addr.Port)
|
|
} else { // for ipv4 addresses
|
|
rpcEndpoint = "http://" + addr.Hostname + ":" + fmt.Sprint(addr.Port)
|
|
}
|
|
endpoints[i] = rpcEndpoint
|
|
}
|
|
return endpoints
|
|
}
|