65740193f9
* Problem: grpc query is not run concurrently Solution: - Initiate the GRPCClient introduced in [sdk 0.46](https://github.com/cosmos/cosmos-sdk/pull/11234). * Update CHANGELOG.md * Update CHANGELOG.md * Update server/start.go Co-authored-by: Federico Kunze Küllmer <31522760+fedekunze@users.noreply.github.com> * wrap error * Update server/start.go * more complete copy * fix grpc crash Co-authored-by: Federico Kunze Küllmer <31522760+fedekunze@users.noreply.github.com>
579 lines
20 KiB
Go
579 lines
20 KiB
Go
package server
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"io"
|
|
"net"
|
|
"net/http"
|
|
"os"
|
|
"path/filepath"
|
|
"runtime/pprof"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/cosmos/cosmos-sdk/codec"
|
|
"github.com/cosmos/cosmos-sdk/crypto/keyring"
|
|
|
|
"github.com/spf13/cobra"
|
|
|
|
"google.golang.org/grpc"
|
|
"google.golang.org/grpc/credentials/insecure"
|
|
|
|
abciserver "github.com/tendermint/tendermint/abci/server"
|
|
tcmd "github.com/tendermint/tendermint/cmd/tendermint/commands"
|
|
tmos "github.com/tendermint/tendermint/libs/os"
|
|
"github.com/tendermint/tendermint/node"
|
|
"github.com/tendermint/tendermint/p2p"
|
|
pvm "github.com/tendermint/tendermint/privval"
|
|
"github.com/tendermint/tendermint/proxy"
|
|
"github.com/tendermint/tendermint/rpc/client/local"
|
|
dbm "github.com/tendermint/tm-db"
|
|
|
|
"github.com/cosmos/cosmos-sdk/server/rosetta"
|
|
crgserver "github.com/cosmos/cosmos-sdk/server/rosetta/lib/server"
|
|
|
|
"github.com/cosmos/cosmos-sdk/client"
|
|
"github.com/cosmos/cosmos-sdk/client/flags"
|
|
pruningtypes "github.com/cosmos/cosmos-sdk/pruning/types"
|
|
"github.com/cosmos/cosmos-sdk/server"
|
|
"github.com/cosmos/cosmos-sdk/server/api"
|
|
serverconfig "github.com/cosmos/cosmos-sdk/server/config"
|
|
servergrpc "github.com/cosmos/cosmos-sdk/server/grpc"
|
|
"github.com/cosmos/cosmos-sdk/server/types"
|
|
sdkerrors "github.com/cosmos/cosmos-sdk/types/errors"
|
|
|
|
"github.com/evmos/ethermint/indexer"
|
|
ethdebug "github.com/evmos/ethermint/rpc/namespaces/ethereum/debug"
|
|
"github.com/evmos/ethermint/server/config"
|
|
srvflags "github.com/evmos/ethermint/server/flags"
|
|
ethermint "github.com/evmos/ethermint/types"
|
|
)
|
|
|
|
// StartCmd runs the service passed in, either stand-alone or in-process with
|
|
// Tendermint.
|
|
func StartCmd(appCreator types.AppCreator, defaultNodeHome string) *cobra.Command {
|
|
cmd := &cobra.Command{
|
|
Use: "start",
|
|
Short: "Run the full node",
|
|
Long: `Run the full node application with Tendermint in or out of process. By
|
|
default, the application will run with Tendermint in process.
|
|
|
|
Pruning options can be provided via the '--pruning' flag or alternatively with '--pruning-keep-recent',
|
|
'pruning-keep-every', and 'pruning-interval' together.
|
|
|
|
For '--pruning' the options are as follows:
|
|
|
|
default: the last 100 states are kept in addition to every 500th state; pruning at 10 block intervals
|
|
nothing: all historic states will be saved, nothing will be deleted (i.e. archiving node)
|
|
everything: all saved states will be deleted, storing only the current state; pruning at 10 block intervals
|
|
custom: allow pruning options to be manually specified through 'pruning-keep-recent', 'pruning-keep-every', and 'pruning-interval'
|
|
|
|
Node halting configurations exist in the form of two flags: '--halt-height' and '--halt-time'. During
|
|
the ABCI Commit phase, the node will check if the current block height is greater than or equal to
|
|
the halt-height or if the current block time is greater than or equal to the halt-time. If so, the
|
|
node will attempt to gracefully shutdown and the block will not be committed. In addition, the node
|
|
will not be able to commit subsequent blocks.
|
|
|
|
For profiling and benchmarking purposes, CPU profiling can be enabled via the '--cpu-profile' flag
|
|
which accepts a path for the resulting pprof file.
|
|
`,
|
|
PreRunE: func(cmd *cobra.Command, _ []string) error {
|
|
serverCtx := server.GetServerContextFromCmd(cmd)
|
|
|
|
// Bind flags to the Context's Viper so the app construction can set
|
|
// options accordingly.
|
|
err := serverCtx.Viper.BindPFlags(cmd.Flags())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
_, err = server.GetPruningOptionsFromFlags(serverCtx.Viper)
|
|
return err
|
|
},
|
|
RunE: func(cmd *cobra.Command, _ []string) error {
|
|
serverCtx := server.GetServerContextFromCmd(cmd)
|
|
clientCtx, err := client.GetClientQueryContext(cmd)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
withTM, _ := cmd.Flags().GetBool(srvflags.WithTendermint)
|
|
if !withTM {
|
|
serverCtx.Logger.Info("starting ABCI without Tendermint")
|
|
return startStandAlone(serverCtx, appCreator)
|
|
}
|
|
|
|
serverCtx.Logger.Info("Unlocking keyring")
|
|
|
|
// fire unlock precess for keyring
|
|
keyringBackend, _ := cmd.Flags().GetString(flags.FlagKeyringBackend)
|
|
if keyringBackend == keyring.BackendFile {
|
|
_, err = clientCtx.Keyring.List()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
serverCtx.Logger.Info("starting ABCI with Tendermint")
|
|
|
|
// amino is needed here for backwards compatibility of REST routes
|
|
err = startInProcess(serverCtx, clientCtx, appCreator)
|
|
errCode, ok := err.(server.ErrorCode)
|
|
if !ok {
|
|
return err
|
|
}
|
|
|
|
serverCtx.Logger.Debug(fmt.Sprintf("received quit signal: %d", errCode.Code))
|
|
return nil
|
|
},
|
|
}
|
|
|
|
cmd.Flags().String(flags.FlagHome, defaultNodeHome, "The application home directory")
|
|
cmd.Flags().Bool(srvflags.WithTendermint, true, "Run abci app embedded in-process with tendermint")
|
|
cmd.Flags().String(srvflags.Address, "tcp://0.0.0.0:26658", "Listen address")
|
|
cmd.Flags().String(srvflags.Transport, "socket", "Transport protocol: socket, grpc")
|
|
cmd.Flags().String(srvflags.TraceStore, "", "Enable KVStore tracing to an output file")
|
|
cmd.Flags().String(server.FlagMinGasPrices, "", "Minimum gas prices to accept for transactions; Any fee in a tx must meet this minimum (e.g. 0.01photon;0.0001stake)") //nolint:lll
|
|
cmd.Flags().IntSlice(server.FlagUnsafeSkipUpgrades, []int{}, "Skip a set of upgrade heights to continue the old binary")
|
|
cmd.Flags().Uint64(server.FlagHaltHeight, 0, "Block height at which to gracefully halt the chain and shutdown the node")
|
|
cmd.Flags().Uint64(server.FlagHaltTime, 0, "Minimum block time (in Unix seconds) at which to gracefully halt the chain and shutdown the node")
|
|
cmd.Flags().Bool(server.FlagInterBlockCache, true, "Enable inter-block caching")
|
|
cmd.Flags().String(srvflags.CPUProfile, "", "Enable CPU profiling and write to the provided file")
|
|
cmd.Flags().Bool(server.FlagTrace, false, "Provide full stack traces for errors in ABCI Log")
|
|
cmd.Flags().String(server.FlagPruning, pruningtypes.PruningOptionDefault, "Pruning strategy (default|nothing|everything|custom)")
|
|
cmd.Flags().Uint64(server.FlagPruningKeepRecent, 0, "Number of recent heights to keep on disk (ignored if pruning is not 'custom')")
|
|
cmd.Flags().Uint64(server.FlagPruningInterval, 0, "Height interval at which pruned heights are removed from disk (ignored if pruning is not 'custom')") //nolint:lll
|
|
cmd.Flags().Uint(server.FlagInvCheckPeriod, 0, "Assert registered invariants every N blocks")
|
|
cmd.Flags().Uint64(server.FlagMinRetainBlocks, 0, "Minimum block height offset during ABCI commit to prune Tendermint blocks")
|
|
cmd.Flags().String(srvflags.AppDBBackend, "", "The type of database for application and snapshots databases")
|
|
|
|
cmd.Flags().Bool(srvflags.GRPCEnable, true, "Define if the gRPC server should be enabled")
|
|
cmd.Flags().String(srvflags.GRPCAddress, serverconfig.DefaultGRPCAddress, "the gRPC server address to listen on")
|
|
cmd.Flags().Bool(srvflags.GRPCWebEnable, true, "Define if the gRPC-Web server should be enabled. (Note: gRPC must also be enabled.)")
|
|
cmd.Flags().String(srvflags.GRPCWebAddress, serverconfig.DefaultGRPCWebAddress, "The gRPC-Web server address to listen on")
|
|
|
|
cmd.Flags().Bool(srvflags.RPCEnable, false, "Defines if Cosmos-sdk REST server should be enabled")
|
|
cmd.Flags().Bool(srvflags.EnabledUnsafeCors, false, "Defines if CORS should be enabled (unsafe - use it at your own risk)")
|
|
|
|
cmd.Flags().Bool(srvflags.JSONRPCEnable, true, "Define if the gRPC server should be enabled")
|
|
cmd.Flags().StringSlice(srvflags.JSONRPCAPI, config.GetDefaultAPINamespaces(), "Defines a list of JSON-RPC namespaces that should be enabled")
|
|
cmd.Flags().String(srvflags.JSONRPCAddress, config.DefaultJSONRPCAddress, "the JSON-RPC server address to listen on")
|
|
cmd.Flags().String(srvflags.JSONWsAddress, config.DefaultJSONRPCWsAddress, "the JSON-RPC WS server address to listen on")
|
|
cmd.Flags().Uint64(srvflags.JSONRPCGasCap, config.DefaultGasCap, "Sets a cap on gas that can be used in eth_call/estimateGas unit is aphoton (0=infinite)") //nolint:lll
|
|
cmd.Flags().Float64(srvflags.JSONRPCTxFeeCap, config.DefaultTxFeeCap, "Sets a cap on transaction fee that can be sent via the RPC APIs (1 = default 1 photon)") //nolint:lll
|
|
cmd.Flags().Int32(srvflags.JSONRPCFilterCap, config.DefaultFilterCap, "Sets the global cap for total number of filters that can be created")
|
|
cmd.Flags().Duration(srvflags.JSONRPCEVMTimeout, config.DefaultEVMTimeout, "Sets a timeout used for eth_call (0=infinite)")
|
|
cmd.Flags().Duration(srvflags.JSONRPCHTTPTimeout, config.DefaultHTTPTimeout, "Sets a read/write timeout for json-rpc http server (0=infinite)")
|
|
cmd.Flags().Duration(srvflags.JSONRPCHTTPIdleTimeout, config.DefaultHTTPIdleTimeout, "Sets a idle timeout for json-rpc http server (0=infinite)")
|
|
cmd.Flags().Bool(srvflags.JSONRPCAllowUnprotectedTxs, config.DefaultAllowUnprotectedTxs, "Allow for unprotected (non EIP155 signed) transactions to be submitted via the node's RPC when the global parameter is disabled") //nolint:lll
|
|
cmd.Flags().Int32(srvflags.JSONRPCLogsCap, config.DefaultLogsCap, "Sets the max number of results can be returned from single `eth_getLogs` query")
|
|
cmd.Flags().Int32(srvflags.JSONRPCBlockRangeCap, config.DefaultBlockRangeCap, "Sets the max block range allowed for `eth_getLogs` query")
|
|
cmd.Flags().Int(srvflags.JSONRPCMaxOpenConnections, config.DefaultMaxOpenConnections, "Sets the maximum number of simultaneous connections for the server listener") //nolint:lll
|
|
cmd.Flags().Bool(srvflags.JSONRPCEnableIndexer, false, "Enable the custom tx indexer for json-rpc")
|
|
|
|
cmd.Flags().String(srvflags.EVMTracer, config.DefaultEVMTracer, "the EVM tracer type to collect execution traces from the EVM transaction execution (json|struct|access_list|markdown)") //nolint:lll
|
|
cmd.Flags().Uint64(srvflags.EVMMaxTxGasWanted, config.DefaultMaxTxGasWanted, "the gas wanted for each eth tx returned in ante handler in check tx mode") //nolint:lll
|
|
|
|
cmd.Flags().String(srvflags.TLSCertPath, "", "the cert.pem file path for the server TLS configuration")
|
|
cmd.Flags().String(srvflags.TLSKeyPath, "", "the key.pem file path for the server TLS configuration")
|
|
|
|
cmd.Flags().Uint64(server.FlagStateSyncSnapshotInterval, 0, "State sync snapshot interval")
|
|
cmd.Flags().Uint32(server.FlagStateSyncSnapshotKeepRecent, 2, "State sync snapshot to keep")
|
|
|
|
// add support for all Tendermint-specific command line options
|
|
tcmd.AddNodeFlags(cmd)
|
|
return cmd
|
|
}
|
|
|
|
func startStandAlone(ctx *server.Context, appCreator types.AppCreator) error {
|
|
addr := ctx.Viper.GetString(srvflags.Address)
|
|
transport := ctx.Viper.GetString(srvflags.Transport)
|
|
home := ctx.Viper.GetString(flags.FlagHome)
|
|
|
|
db, err := openDB(home, server.GetAppDBBackend(ctx.Viper))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer func() {
|
|
if err := db.Close(); err != nil {
|
|
ctx.Logger.With("error", err).Error("error closing db")
|
|
}
|
|
}()
|
|
|
|
traceWriterFile := ctx.Viper.GetString(srvflags.TraceStore)
|
|
traceWriter, err := openTraceWriter(traceWriterFile)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
app := appCreator(ctx.Logger, db, traceWriter, ctx.Viper)
|
|
|
|
svr, err := abciserver.NewServer(addr, transport, app)
|
|
if err != nil {
|
|
return fmt.Errorf("error creating listener: %v", err)
|
|
}
|
|
|
|
svr.SetLogger(ctx.Logger.With("server", "abci"))
|
|
|
|
err = svr.Start()
|
|
if err != nil {
|
|
tmos.Exit(err.Error())
|
|
}
|
|
|
|
defer func() {
|
|
if err = svr.Stop(); err != nil {
|
|
tmos.Exit(err.Error())
|
|
}
|
|
}()
|
|
|
|
// Wait for SIGINT or SIGTERM signal
|
|
return server.WaitForQuitSignals()
|
|
}
|
|
|
|
// legacyAminoCdc is used for the legacy REST API
|
|
func startInProcess(ctx *server.Context, clientCtx client.Context, appCreator types.AppCreator) (err error) {
|
|
cfg := ctx.Config
|
|
home := cfg.RootDir
|
|
logger := ctx.Logger
|
|
var cpuProfileCleanup func() error
|
|
|
|
if cpuProfile := ctx.Viper.GetString(srvflags.CPUProfile); cpuProfile != "" {
|
|
fp, err := ethdebug.ExpandHome(cpuProfile)
|
|
if err != nil {
|
|
ctx.Logger.Debug("failed to get filepath for the CPU profile file", "error", err.Error())
|
|
return err
|
|
}
|
|
f, err := os.Create(fp)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
ctx.Logger.Info("starting CPU profiler", "profile", cpuProfile)
|
|
if err := pprof.StartCPUProfile(f); err != nil {
|
|
return err
|
|
}
|
|
|
|
cpuProfileCleanup = func() error {
|
|
ctx.Logger.Info("stopping CPU profiler", "profile", cpuProfile)
|
|
pprof.StopCPUProfile()
|
|
if err := f.Close(); err != nil {
|
|
logger.Error("failed to close CPU profiler file", "error", err.Error())
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
}
|
|
|
|
traceWriterFile := ctx.Viper.GetString(srvflags.TraceStore)
|
|
db, err := openDB(home, server.GetAppDBBackend(ctx.Viper))
|
|
if err != nil {
|
|
logger.Error("failed to open DB", "error", err.Error())
|
|
return err
|
|
}
|
|
defer func() {
|
|
if err := db.Close(); err != nil {
|
|
ctx.Logger.With("error", err).Error("error closing db")
|
|
}
|
|
}()
|
|
|
|
traceWriter, err := openTraceWriter(traceWriterFile)
|
|
if err != nil {
|
|
logger.Error("failed to open trace writer", "error", err.Error())
|
|
return err
|
|
}
|
|
|
|
config, err := config.GetConfig(ctx.Viper)
|
|
if err != nil {
|
|
logger.Error("failed to get server config", "error", err.Error())
|
|
return err
|
|
}
|
|
|
|
if err := config.ValidateBasic(); err != nil {
|
|
if strings.Contains(err.Error(), "set min gas price in app.toml or flag or env variable") {
|
|
ctx.Logger.Error(
|
|
"WARNING: The minimum-gas-prices config in app.toml is set to the empty string. " +
|
|
"This defaults to 0 in the current version, but will error in the next version " +
|
|
"(SDK v0.44). Please explicitly put the desired minimum-gas-prices in your app.toml.",
|
|
)
|
|
} else {
|
|
return err
|
|
}
|
|
}
|
|
|
|
app := appCreator(ctx.Logger, db, traceWriter, ctx.Viper)
|
|
|
|
nodeKey, err := p2p.LoadOrGenNodeKey(cfg.NodeKeyFile())
|
|
if err != nil {
|
|
logger.Error("failed load or gen node key", "error", err.Error())
|
|
return err
|
|
}
|
|
|
|
genDocProvider := node.DefaultGenesisDocProviderFunc(cfg)
|
|
tmNode, err := node.NewNode(
|
|
cfg,
|
|
pvm.LoadOrGenFilePV(cfg.PrivValidatorKeyFile(), cfg.PrivValidatorStateFile()),
|
|
nodeKey,
|
|
proxy.NewLocalClientCreator(app),
|
|
genDocProvider,
|
|
node.DefaultDBProvider,
|
|
node.DefaultMetricsProvider(cfg.Instrumentation),
|
|
ctx.Logger.With("server", "node"),
|
|
)
|
|
if err != nil {
|
|
logger.Error("failed init node", "error", err.Error())
|
|
return err
|
|
}
|
|
|
|
if err := tmNode.Start(); err != nil {
|
|
logger.Error("failed start tendermint server", "error", err.Error())
|
|
return err
|
|
}
|
|
|
|
// Add the tx service to the gRPC router. We only need to register this
|
|
// service if API or gRPC or JSONRPC is enabled, and avoid doing so in the general
|
|
// case, because it spawns a new local tendermint RPC client.
|
|
if config.API.Enable || config.GRPC.Enable || config.JSONRPC.Enable || config.JSONRPC.EnableIndexer {
|
|
clientCtx = clientCtx.WithClient(local.New(tmNode))
|
|
|
|
app.RegisterTxService(clientCtx)
|
|
app.RegisterTendermintService(clientCtx)
|
|
}
|
|
|
|
var idxer ethermint.EVMTxIndexer
|
|
if config.JSONRPC.EnableIndexer {
|
|
idxDB, err := OpenIndexerDB(home, server.GetAppDBBackend(ctx.Viper))
|
|
if err != nil {
|
|
logger.Error("failed to open evm indexer DB", "error", err.Error())
|
|
return err
|
|
}
|
|
idxLogger := ctx.Logger.With("module", "evmindex")
|
|
idxer = indexer.NewKVIndexer(idxDB, idxLogger, clientCtx)
|
|
indexerService := NewEVMIndexerService(idxer, clientCtx.Client)
|
|
indexerService.SetLogger(idxLogger)
|
|
|
|
errCh := make(chan error)
|
|
go func() {
|
|
if err := indexerService.Start(); err != nil {
|
|
errCh <- err
|
|
}
|
|
}()
|
|
|
|
select {
|
|
case err := <-errCh:
|
|
return err
|
|
case <-time.After(types.ServerStartTime): // assume server started successfully
|
|
}
|
|
}
|
|
|
|
if config.API.Enable || config.JSONRPC.Enable {
|
|
genDoc, err := genDocProvider()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
clientCtx = clientCtx.
|
|
WithHomeDir(home).
|
|
WithChainID(genDoc.ChainID)
|
|
|
|
// Set `GRPCClient` to `clientCtx` to enjoy concurrent grpc query.
|
|
// only use it if gRPC server is enabled.
|
|
if config.GRPC.Enable {
|
|
_, port, err := net.SplitHostPort(config.GRPC.Address)
|
|
if err != nil {
|
|
return sdkerrors.Wrapf(err, "invalid grpc address %s", config.GRPC.Address)
|
|
}
|
|
|
|
maxSendMsgSize := config.GRPC.MaxSendMsgSize
|
|
if maxSendMsgSize == 0 {
|
|
maxSendMsgSize = serverconfig.DefaultGRPCMaxSendMsgSize
|
|
}
|
|
|
|
maxRecvMsgSize := config.GRPC.MaxRecvMsgSize
|
|
if maxRecvMsgSize == 0 {
|
|
maxRecvMsgSize = serverconfig.DefaultGRPCMaxRecvMsgSize
|
|
}
|
|
|
|
grpcAddress := fmt.Sprintf("127.0.0.1:%s", port)
|
|
|
|
// If grpc is enabled, configure grpc client for grpc gateway and json-rpc.
|
|
grpcClient, err := grpc.Dial(
|
|
grpcAddress,
|
|
grpc.WithTransportCredentials(insecure.NewCredentials()),
|
|
grpc.WithDefaultCallOptions(
|
|
grpc.ForceCodec(codec.NewProtoCodec(clientCtx.InterfaceRegistry).GRPCCodec()),
|
|
grpc.MaxCallRecvMsgSize(maxRecvMsgSize),
|
|
grpc.MaxCallSendMsgSize(maxSendMsgSize),
|
|
),
|
|
)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
clientCtx = clientCtx.WithGRPCClient(grpcClient)
|
|
ctx.Logger.Debug("gRPC client assigned to client context", "address", grpcAddress)
|
|
}
|
|
}
|
|
|
|
var apiSrv *api.Server
|
|
if config.API.Enable {
|
|
apiSrv = api.New(clientCtx, ctx.Logger.With("server", "api"))
|
|
app.RegisterAPIRoutes(apiSrv, config.API)
|
|
errCh := make(chan error)
|
|
|
|
go func() {
|
|
if err := apiSrv.Start(config.Config); err != nil {
|
|
errCh <- err
|
|
}
|
|
}()
|
|
|
|
select {
|
|
case err := <-errCh:
|
|
return err
|
|
case <-time.After(types.ServerStartTime): // assume server started successfully
|
|
}
|
|
}
|
|
|
|
var (
|
|
grpcSrv *grpc.Server
|
|
grpcWebSrv *http.Server
|
|
)
|
|
if config.GRPC.Enable {
|
|
grpcSrv, err = servergrpc.StartGRPCServer(clientCtx, app, config.GRPC)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if config.GRPCWeb.Enable {
|
|
grpcWebSrv, err = servergrpc.StartGRPCWeb(grpcSrv, config.Config)
|
|
if err != nil {
|
|
ctx.Logger.Error("failed to start grpc-web http server", "error", err)
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
|
|
var rosettaSrv crgserver.Server
|
|
if config.Rosetta.Enable {
|
|
offlineMode := config.Rosetta.Offline
|
|
if !config.GRPC.Enable { // If GRPC is not enabled rosetta cannot work in online mode, so it works in offline mode.
|
|
offlineMode = true
|
|
}
|
|
|
|
conf := &rosetta.Config{
|
|
Blockchain: config.Rosetta.Blockchain,
|
|
Network: config.Rosetta.Network,
|
|
TendermintRPC: ctx.Config.RPC.ListenAddress,
|
|
GRPCEndpoint: config.GRPC.Address,
|
|
Addr: config.Rosetta.Address,
|
|
Retries: config.Rosetta.Retries,
|
|
Offline: offlineMode,
|
|
}
|
|
conf.WithCodec(clientCtx.InterfaceRegistry, clientCtx.Codec.(*codec.ProtoCodec))
|
|
|
|
rosettaSrv, err = rosetta.ServerFromConfig(conf)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
errCh := make(chan error)
|
|
go func() {
|
|
if err := rosettaSrv.Start(); err != nil {
|
|
errCh <- err
|
|
}
|
|
}()
|
|
|
|
select {
|
|
case err := <-errCh:
|
|
return err
|
|
case <-time.After(types.ServerStartTime): // assume server started successfully
|
|
}
|
|
}
|
|
|
|
var (
|
|
httpSrv *http.Server
|
|
httpSrvDone chan struct{}
|
|
)
|
|
|
|
if config.JSONRPC.Enable {
|
|
genDoc, err := genDocProvider()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
clientCtx := clientCtx.WithChainID(genDoc.ChainID)
|
|
|
|
tmEndpoint := "/websocket"
|
|
tmRPCAddr := cfg.RPC.ListenAddress
|
|
httpSrv, httpSrvDone, err = StartJSONRPC(ctx, clientCtx, tmRPCAddr, tmEndpoint, &config, idxer)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
defer func() {
|
|
if tmNode.IsRunning() {
|
|
_ = tmNode.Stop()
|
|
}
|
|
|
|
if cpuProfileCleanup != nil {
|
|
_ = cpuProfileCleanup()
|
|
}
|
|
|
|
if apiSrv != nil {
|
|
_ = apiSrv.Close()
|
|
}
|
|
|
|
if grpcSrv != nil {
|
|
grpcSrv.Stop()
|
|
if grpcWebSrv != nil {
|
|
if err := grpcWebSrv.Close(); err != nil {
|
|
logger.Error("failed to close the grpcWebSrc", "error", err.Error())
|
|
}
|
|
}
|
|
}
|
|
|
|
if httpSrv != nil {
|
|
shutdownCtx, cancelFn := context.WithTimeout(context.Background(), 10*time.Second)
|
|
defer cancelFn()
|
|
|
|
if err := httpSrv.Shutdown(shutdownCtx); err != nil {
|
|
logger.Error("HTTP server shutdown produced a warning", "error", err.Error())
|
|
} else {
|
|
logger.Info("HTTP server shut down, waiting 5 sec")
|
|
select {
|
|
case <-time.Tick(5 * time.Second):
|
|
case <-httpSrvDone:
|
|
}
|
|
}
|
|
}
|
|
|
|
logger.Info("Bye!")
|
|
}()
|
|
|
|
// Wait for SIGINT or SIGTERM signal
|
|
return server.WaitForQuitSignals()
|
|
}
|
|
|
|
func openDB(rootDir string, backendType dbm.BackendType) (dbm.DB, error) {
|
|
dataDir := filepath.Join(rootDir, "data")
|
|
return dbm.NewDB("application", backendType, dataDir)
|
|
}
|
|
|
|
// OpenIndexerDB opens the custom eth indexer db, using the same db backend as the main app
|
|
func OpenIndexerDB(rootDir string, backendType dbm.BackendType) (dbm.DB, error) {
|
|
dataDir := filepath.Join(rootDir, "data")
|
|
return dbm.NewDB("evmindexer", backendType, dataDir)
|
|
}
|
|
|
|
func openTraceWriter(traceWriterFile string) (w io.Writer, err error) {
|
|
if traceWriterFile == "" {
|
|
return
|
|
}
|
|
|
|
filePath := filepath.Clean(traceWriterFile)
|
|
return os.OpenFile(
|
|
filePath,
|
|
os.O_WRONLY|os.O_APPEND|os.O_CREATE,
|
|
0o600,
|
|
)
|
|
}
|