2020-07-22 09:34:55 +00:00
|
|
|
//! Provides management of "initialized" validators.
|
|
|
|
//!
|
|
|
|
//! A validator is "initialized" if it is ready for signing blocks, attestations, etc in this
|
|
|
|
//! validator client.
|
|
|
|
//!
|
|
|
|
//! The `InitializedValidators` struct in this file serves as the source-of-truth of which
|
|
|
|
//! validators are managed by this validator client.
|
|
|
|
|
2021-09-16 03:26:33 +00:00
|
|
|
use crate::signing_method::SigningMethod;
|
2020-07-29 04:32:50 +00:00
|
|
|
use account_utils::{
|
|
|
|
read_password, read_password_from_user,
|
|
|
|
validator_definitions::{
|
|
|
|
self, SigningDefinition, ValidatorDefinition, ValidatorDefinitions, CONFIG_FILENAME,
|
|
|
|
},
|
2020-10-05 10:50:43 +00:00
|
|
|
ZeroizeString,
|
2020-07-22 09:34:55 +00:00
|
|
|
};
|
|
|
|
use eth2_keystore::Keystore;
|
2021-05-26 05:58:41 +00:00
|
|
|
use lighthouse_metrics::set_gauge;
|
2020-11-26 11:25:46 +00:00
|
|
|
use lockfile::{Lockfile, LockfileError};
|
2022-01-30 23:22:04 +00:00
|
|
|
use parking_lot::{MappedMutexGuard, Mutex, MutexGuard};
|
2022-05-18 23:14:37 +00:00
|
|
|
use reqwest::{Certificate, Client, Error as ReqwestError, Identity};
|
2020-10-05 10:50:43 +00:00
|
|
|
use slog::{debug, error, info, warn, Logger};
|
|
|
|
use std::collections::{HashMap, HashSet};
|
2022-01-30 23:22:04 +00:00
|
|
|
use std::fs::{self, File};
|
2021-09-16 03:26:33 +00:00
|
|
|
use std::io::{self, Read};
|
2021-03-26 04:53:57 +00:00
|
|
|
use std::path::{Path, PathBuf};
|
2021-09-16 03:26:33 +00:00
|
|
|
use std::sync::Arc;
|
|
|
|
use std::time::Duration;
|
2022-02-08 19:52:20 +00:00
|
|
|
use types::{Address, Graffiti, Keypair, PublicKey, PublicKeyBytes};
|
2021-09-16 03:26:33 +00:00
|
|
|
use url::{ParseError, Url};
|
2022-01-30 23:22:04 +00:00
|
|
|
use validator_dir::Builder as ValidatorDirBuilder;
|
2020-07-22 09:34:55 +00:00
|
|
|
|
2020-10-05 10:50:43 +00:00
|
|
|
use crate::key_cache;
|
|
|
|
use crate::key_cache::KeyCache;
|
|
|
|
|
2021-09-16 03:26:33 +00:00
|
|
|
/// Default timeout for a request to a remote signer for a signature.
|
|
|
|
///
|
|
|
|
/// Set to 12 seconds since that's the duration of a slot. A remote signer that cannot sign within
|
|
|
|
/// that time is outside the synchronous assumptions of Eth2.
|
|
|
|
const DEFAULT_REMOTE_SIGNER_REQUEST_TIMEOUT: Duration = Duration::from_secs(12);
|
|
|
|
|
2020-07-29 04:32:50 +00:00
|
|
|
// Use TTY instead of stdin to capture passwords from users.
|
|
|
|
const USE_STDIN: bool = false;
|
|
|
|
|
2020-07-22 09:34:55 +00:00
|
|
|
#[derive(Debug)]
|
|
|
|
pub enum Error {
|
|
|
|
/// Refused to open a validator with an existing lockfile since that validator may be in-use by
|
|
|
|
/// another process.
|
2021-07-30 01:11:47 +00:00
|
|
|
Lockfile(LockfileError),
|
2020-07-22 09:34:55 +00:00
|
|
|
/// The voting public key in the definition did not match the one in the keystore.
|
|
|
|
VotingPublicKeyMismatch {
|
|
|
|
definition: Box<PublicKey>,
|
|
|
|
keystore: Box<PublicKey>,
|
|
|
|
},
|
|
|
|
/// There was a filesystem error when opening the keystore.
|
|
|
|
UnableToOpenVotingKeystore(io::Error),
|
2020-10-05 10:50:43 +00:00
|
|
|
UnableToOpenKeyCache(key_cache::Error),
|
2020-07-22 09:34:55 +00:00
|
|
|
/// The keystore path is not as expected. It should be a file, not `..` or something obscure
|
|
|
|
/// like that.
|
|
|
|
BadVotingKeystorePath(PathBuf),
|
2020-10-05 10:50:43 +00:00
|
|
|
BadKeyCachePath(PathBuf),
|
2020-07-22 09:34:55 +00:00
|
|
|
/// The keystore could not be parsed, it is likely bad JSON.
|
|
|
|
UnableToParseVotingKeystore(eth2_keystore::Error),
|
|
|
|
/// The keystore could not be decrypted. The password might be wrong.
|
|
|
|
UnableToDecryptKeystore(eth2_keystore::Error),
|
|
|
|
/// There was a filesystem error when reading the keystore password from disk.
|
|
|
|
UnableToReadVotingKeystorePassword(io::Error),
|
|
|
|
/// There was an error updating the on-disk validator definitions file.
|
|
|
|
UnableToSaveDefinitions(validator_definitions::Error),
|
|
|
|
/// It is not legal to try and initialize a disabled validator definition.
|
|
|
|
UnableToInitializeDisabledValidator,
|
2022-01-30 23:22:04 +00:00
|
|
|
/// There was an error while deleting a keystore file.
|
|
|
|
UnableToDeleteKeystore(PathBuf, io::Error),
|
|
|
|
/// There was an error while deleting a validator dir.
|
|
|
|
UnableToDeleteValidatorDir(PathBuf, io::Error),
|
2020-07-22 09:34:55 +00:00
|
|
|
/// There was an error reading from stdin.
|
2020-07-29 04:32:50 +00:00
|
|
|
UnableToReadPasswordFromUser(String),
|
2020-09-24 04:06:02 +00:00
|
|
|
/// There was an error running a tokio async task.
|
|
|
|
TokioJoin(tokio::task::JoinError),
|
2020-10-02 09:42:19 +00:00
|
|
|
/// Cannot initialize the same validator twice.
|
|
|
|
DuplicatePublicKey,
|
2021-07-31 03:50:52 +00:00
|
|
|
/// The public key does not exist in the set of initialized validators.
|
|
|
|
ValidatorNotInitialized(PublicKey),
|
|
|
|
/// Unable to read the slot clock.
|
|
|
|
SlotClock,
|
2021-09-16 03:26:33 +00:00
|
|
|
/// The URL for the remote signer cannot be parsed.
|
|
|
|
InvalidWeb3SignerUrl(String),
|
|
|
|
/// Unable to read the root certificate file for the remote signer.
|
|
|
|
InvalidWeb3SignerRootCertificateFile(io::Error),
|
|
|
|
InvalidWeb3SignerRootCertificate(ReqwestError),
|
2022-05-18 23:14:37 +00:00
|
|
|
/// Unable to read the client certificate for the remote signer.
|
|
|
|
MissingWeb3SignerClientIdentityCertificateFile,
|
|
|
|
MissingWeb3SignerClientIdentityPassword,
|
|
|
|
InvalidWeb3SignerClientIdentityCertificateFile(io::Error),
|
|
|
|
InvalidWeb3SignerClientIdentityCertificate(ReqwestError),
|
2021-09-16 03:26:33 +00:00
|
|
|
UnableToBuildWeb3SignerClient(ReqwestError),
|
2022-05-09 07:21:38 +00:00
|
|
|
/// Unable to apply an action to a validator.
|
|
|
|
InvalidActionOnValidator,
|
2020-07-22 09:34:55 +00:00
|
|
|
}
|
|
|
|
|
2020-11-26 11:25:46 +00:00
|
|
|
impl From<LockfileError> for Error {
|
|
|
|
fn from(error: LockfileError) -> Self {
|
2021-07-30 01:11:47 +00:00
|
|
|
Self::Lockfile(error)
|
2020-11-26 11:25:46 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-22 09:34:55 +00:00
|
|
|
/// A validator that is ready to sign messages.
|
|
|
|
pub struct InitializedValidator {
|
2021-09-16 03:26:33 +00:00
|
|
|
signing_method: Arc<SigningMethod>,
|
2021-03-02 22:35:46 +00:00
|
|
|
graffiti: Option<Graffiti>,
|
2022-02-08 19:52:20 +00:00
|
|
|
suggested_fee_recipient: Option<Address>,
|
2021-07-31 03:50:52 +00:00
|
|
|
/// The validators index in `state.validators`, to be updated by an external service.
|
|
|
|
index: Option<u64>,
|
2020-07-22 09:34:55 +00:00
|
|
|
}
|
|
|
|
|
2020-11-26 11:25:46 +00:00
|
|
|
impl InitializedValidator {
|
|
|
|
/// Return a reference to this validator's lockfile if it has one.
|
2022-01-30 23:22:04 +00:00
|
|
|
pub fn keystore_lockfile(&self) -> Option<MappedMutexGuard<Lockfile>> {
|
2021-09-16 03:26:33 +00:00
|
|
|
match self.signing_method.as_ref() {
|
2020-11-26 11:25:46 +00:00
|
|
|
SigningMethod::LocalKeystore {
|
|
|
|
ref voting_keystore_lockfile,
|
|
|
|
..
|
2022-01-30 23:22:04 +00:00
|
|
|
} => MutexGuard::try_map(voting_keystore_lockfile.lock(), |option_lockfile| {
|
|
|
|
option_lockfile.as_mut()
|
|
|
|
})
|
|
|
|
.ok(),
|
2021-09-16 03:26:33 +00:00
|
|
|
// Web3Signer validators do not have any lockfiles.
|
|
|
|
SigningMethod::Web3Signer { .. } => None,
|
2020-11-26 11:25:46 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-26 04:53:57 +00:00
|
|
|
fn open_keystore(path: &Path) -> Result<Keystore, Error> {
|
2020-10-05 10:50:43 +00:00
|
|
|
let keystore_file = File::open(path).map_err(Error::UnableToOpenVotingKeystore)?;
|
|
|
|
Keystore::from_json_reader(keystore_file).map_err(Error::UnableToParseVotingKeystore)
|
|
|
|
}
|
|
|
|
|
2021-03-26 04:53:57 +00:00
|
|
|
fn get_lockfile_path(file_path: &Path) -> Option<PathBuf> {
|
2020-10-05 10:50:43 +00:00
|
|
|
file_path
|
|
|
|
.file_name()
|
|
|
|
.and_then(|os_str| os_str.to_str())
|
2021-03-26 04:53:57 +00:00
|
|
|
.map(|filename| file_path.with_file_name(format!("{}.lock", filename)))
|
2020-10-05 10:50:43 +00:00
|
|
|
}
|
|
|
|
|
2020-07-22 09:34:55 +00:00
|
|
|
impl InitializedValidator {
|
|
|
|
/// Instantiate `self` from a `ValidatorDefinition`.
|
|
|
|
///
|
|
|
|
/// If `stdin.is_some()` any missing passwords will result in a prompt requesting input on
|
|
|
|
/// stdin (prompts published to stderr).
|
|
|
|
///
|
|
|
|
/// ## Errors
|
|
|
|
///
|
|
|
|
/// If the validator is unable to be initialized for whatever reason.
|
2020-10-05 10:50:43 +00:00
|
|
|
async fn from_definition(
|
2020-07-22 09:34:55 +00:00
|
|
|
def: ValidatorDefinition,
|
2020-10-05 10:50:43 +00:00
|
|
|
key_cache: &mut KeyCache,
|
|
|
|
key_stores: &mut HashMap<PathBuf, Keystore>,
|
2020-07-22 09:34:55 +00:00
|
|
|
) -> Result<Self, Error> {
|
|
|
|
if !def.enabled {
|
|
|
|
return Err(Error::UnableToInitializeDisabledValidator);
|
|
|
|
}
|
|
|
|
|
2021-09-16 03:26:33 +00:00
|
|
|
let signing_method = match def.signing_definition {
|
2020-07-22 09:34:55 +00:00
|
|
|
// Load the keystore, password, decrypt the keypair and create a lockfile for a
|
|
|
|
// EIP-2335 keystore on the local filesystem.
|
|
|
|
SigningDefinition::LocalKeystore {
|
|
|
|
voting_keystore_path,
|
|
|
|
voting_keystore_password_path,
|
|
|
|
voting_keystore_password,
|
|
|
|
} => {
|
2020-10-05 10:50:43 +00:00
|
|
|
use std::collections::hash_map::Entry::*;
|
|
|
|
let voting_keystore = match key_stores.entry(voting_keystore_path.clone()) {
|
|
|
|
Vacant(entry) => entry.insert(open_keystore(&voting_keystore_path)?),
|
|
|
|
Occupied(entry) => entry.into_mut(),
|
|
|
|
};
|
|
|
|
|
|
|
|
let voting_keypair = if let Some(keypair) = key_cache.get(voting_keystore.uuid()) {
|
|
|
|
keypair
|
|
|
|
} else {
|
|
|
|
let keystore = voting_keystore.clone();
|
|
|
|
let keystore_path = voting_keystore_path.clone();
|
|
|
|
// Decoding a local keystore can take several seconds, therefore it's best
|
|
|
|
// to keep if off the core executor. This also has the fortunate effect of
|
|
|
|
// interrupting the potentially long-running task during shut down.
|
|
|
|
let (password, keypair) = tokio::task::spawn_blocking(move || {
|
2020-11-26 11:25:46 +00:00
|
|
|
Result::<_, Error>::Ok(
|
2020-10-05 10:50:43 +00:00
|
|
|
match (voting_keystore_password_path, voting_keystore_password) {
|
|
|
|
// If the password is supplied, use it and ignore the path
|
|
|
|
// (if supplied).
|
|
|
|
(_, Some(password)) => (
|
|
|
|
password.as_ref().to_vec().into(),
|
|
|
|
keystore
|
|
|
|
.decrypt_keypair(password.as_ref())
|
|
|
|
.map_err(Error::UnableToDecryptKeystore)?,
|
|
|
|
),
|
|
|
|
// If only the path is supplied, use the path.
|
|
|
|
(Some(path), None) => {
|
|
|
|
let password = read_password(path)
|
|
|
|
.map_err(Error::UnableToReadVotingKeystorePassword)?;
|
|
|
|
let keypair = keystore
|
|
|
|
.decrypt_keypair(password.as_bytes())
|
|
|
|
.map_err(Error::UnableToDecryptKeystore)?;
|
|
|
|
(password, keypair)
|
|
|
|
}
|
|
|
|
// If there is no password available, maybe prompt for a password.
|
|
|
|
(None, None) => {
|
|
|
|
let (password, keypair) = unlock_keystore_via_stdin_password(
|
|
|
|
&keystore,
|
|
|
|
&keystore_path,
|
|
|
|
)?;
|
|
|
|
(password.as_ref().to_vec().into(), keypair)
|
|
|
|
}
|
|
|
|
},
|
|
|
|
)
|
|
|
|
})
|
|
|
|
.await
|
|
|
|
.map_err(Error::TokioJoin)??;
|
|
|
|
key_cache.add(keypair.clone(), voting_keystore.uuid(), password);
|
|
|
|
keypair
|
2020-07-22 09:34:55 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
if voting_keypair.pk != def.voting_public_key {
|
|
|
|
return Err(Error::VotingPublicKeyMismatch {
|
|
|
|
definition: Box::new(def.voting_public_key),
|
|
|
|
keystore: Box::new(voting_keypair.pk),
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
// Append a `.lock` suffix to the voting keystore.
|
2020-11-26 11:25:46 +00:00
|
|
|
let lockfile_path = get_lockfile_path(&voting_keystore_path)
|
2020-10-05 10:50:43 +00:00
|
|
|
.ok_or_else(|| Error::BadVotingKeystorePath(voting_keystore_path.clone()))?;
|
|
|
|
|
2022-01-30 23:22:04 +00:00
|
|
|
let voting_keystore_lockfile = Mutex::new(Some(Lockfile::new(lockfile_path)?));
|
2020-07-22 09:34:55 +00:00
|
|
|
|
2021-09-16 03:26:33 +00:00
|
|
|
SigningMethod::LocalKeystore {
|
|
|
|
voting_keystore_path,
|
|
|
|
voting_keystore_lockfile,
|
|
|
|
voting_keystore: voting_keystore.clone(),
|
|
|
|
voting_keypair: Arc::new(voting_keypair),
|
|
|
|
}
|
2020-07-22 09:34:55 +00:00
|
|
|
}
|
2021-09-16 03:26:33 +00:00
|
|
|
SigningDefinition::Web3Signer {
|
|
|
|
url,
|
|
|
|
root_certificate_path,
|
|
|
|
request_timeout_ms,
|
2022-05-18 23:14:37 +00:00
|
|
|
client_identity_path,
|
|
|
|
client_identity_password,
|
2021-09-16 03:26:33 +00:00
|
|
|
} => {
|
|
|
|
let signing_url = build_web3_signer_url(&url, &def.voting_public_key)
|
|
|
|
.map_err(|e| Error::InvalidWeb3SignerUrl(e.to_string()))?;
|
|
|
|
let request_timeout = request_timeout_ms
|
|
|
|
.map(Duration::from_millis)
|
|
|
|
.unwrap_or(DEFAULT_REMOTE_SIGNER_REQUEST_TIMEOUT);
|
|
|
|
|
|
|
|
let builder = Client::builder().timeout(request_timeout);
|
|
|
|
|
|
|
|
let builder = if let Some(path) = root_certificate_path {
|
|
|
|
let certificate = load_pem_certificate(path)?;
|
|
|
|
builder.add_root_certificate(certificate)
|
|
|
|
} else {
|
|
|
|
builder
|
|
|
|
};
|
|
|
|
|
2022-05-18 23:14:37 +00:00
|
|
|
let builder = if let Some(path) = client_identity_path {
|
|
|
|
let identity = load_pkcs12_identity(
|
|
|
|
path,
|
|
|
|
&client_identity_password
|
|
|
|
.ok_or(Error::MissingWeb3SignerClientIdentityPassword)?,
|
|
|
|
)?;
|
|
|
|
builder.identity(identity)
|
|
|
|
} else {
|
|
|
|
if client_identity_password.is_some() {
|
|
|
|
return Err(Error::MissingWeb3SignerClientIdentityCertificateFile);
|
|
|
|
}
|
|
|
|
builder
|
|
|
|
};
|
|
|
|
|
2021-09-16 03:26:33 +00:00
|
|
|
let http_client = builder
|
|
|
|
.build()
|
|
|
|
.map_err(Error::UnableToBuildWeb3SignerClient)?;
|
|
|
|
|
|
|
|
SigningMethod::Web3Signer {
|
|
|
|
signing_url,
|
|
|
|
http_client,
|
|
|
|
voting_public_key: def.voting_public_key,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
Ok(Self {
|
|
|
|
signing_method: Arc::new(signing_method),
|
|
|
|
graffiti: def.graffiti.map(Into::into),
|
2022-02-08 19:52:20 +00:00
|
|
|
suggested_fee_recipient: def.suggested_fee_recipient,
|
2021-09-16 03:26:33 +00:00
|
|
|
index: None,
|
|
|
|
})
|
2020-07-22 09:34:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Returns the voting public key for this validator.
|
|
|
|
pub fn voting_public_key(&self) -> &PublicKey {
|
2021-09-16 03:26:33 +00:00
|
|
|
match self.signing_method.as_ref() {
|
2020-07-22 09:34:55 +00:00
|
|
|
SigningMethod::LocalKeystore { voting_keypair, .. } => &voting_keypair.pk,
|
2021-09-16 03:26:33 +00:00
|
|
|
SigningMethod::Web3Signer {
|
|
|
|
voting_public_key, ..
|
|
|
|
} => voting_public_key,
|
2020-07-22 09:34:55 +00:00
|
|
|
}
|
|
|
|
}
|
2021-09-16 03:26:33 +00:00
|
|
|
}
|
2020-07-22 09:34:55 +00:00
|
|
|
|
2021-09-16 03:26:33 +00:00
|
|
|
pub fn load_pem_certificate<P: AsRef<Path>>(pem_path: P) -> Result<Certificate, Error> {
|
|
|
|
let mut buf = Vec::new();
|
|
|
|
File::open(&pem_path)
|
|
|
|
.map_err(Error::InvalidWeb3SignerRootCertificateFile)?
|
|
|
|
.read_to_end(&mut buf)
|
|
|
|
.map_err(Error::InvalidWeb3SignerRootCertificateFile)?;
|
|
|
|
Certificate::from_pem(&buf).map_err(Error::InvalidWeb3SignerRootCertificate)
|
|
|
|
}
|
|
|
|
|
2022-05-18 23:14:37 +00:00
|
|
|
pub fn load_pkcs12_identity<P: AsRef<Path>>(
|
|
|
|
pkcs12_path: P,
|
|
|
|
password: &str,
|
|
|
|
) -> Result<Identity, Error> {
|
|
|
|
let mut buf = Vec::new();
|
|
|
|
File::open(&pkcs12_path)
|
|
|
|
.map_err(Error::InvalidWeb3SignerClientIdentityCertificateFile)?
|
|
|
|
.read_to_end(&mut buf)
|
|
|
|
.map_err(Error::InvalidWeb3SignerClientIdentityCertificateFile)?;
|
|
|
|
Identity::from_pkcs12_der(&buf, password)
|
|
|
|
.map_err(Error::InvalidWeb3SignerClientIdentityCertificate)
|
|
|
|
}
|
|
|
|
|
2021-09-16 03:26:33 +00:00
|
|
|
fn build_web3_signer_url(base_url: &str, voting_public_key: &PublicKey) -> Result<Url, ParseError> {
|
2022-01-13 22:39:58 +00:00
|
|
|
Url::parse(base_url)?.join(&format!("api/v1/eth2/sign/{}", voting_public_key))
|
2020-07-22 09:34:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Try to unlock `keystore` at `keystore_path` by prompting the user via `stdin`.
|
|
|
|
fn unlock_keystore_via_stdin_password(
|
|
|
|
keystore: &Keystore,
|
2021-03-26 04:53:57 +00:00
|
|
|
keystore_path: &Path,
|
2020-10-05 10:50:43 +00:00
|
|
|
) -> Result<(ZeroizeString, Keypair), Error> {
|
2021-02-15 00:09:12 +00:00
|
|
|
eprintln!();
|
2020-07-22 09:34:55 +00:00
|
|
|
eprintln!(
|
|
|
|
"The {} file does not contain either of the following fields for {:?}:",
|
|
|
|
CONFIG_FILENAME, keystore_path
|
|
|
|
);
|
2021-02-15 00:09:12 +00:00
|
|
|
eprintln!();
|
2020-07-22 09:34:55 +00:00
|
|
|
eprintln!(" - voting_keystore_password");
|
|
|
|
eprintln!(" - voting_keystore_password_path");
|
2021-02-15 00:09:12 +00:00
|
|
|
eprintln!();
|
2020-07-22 09:34:55 +00:00
|
|
|
eprintln!(
|
|
|
|
"You may exit and update {} or enter a password. \
|
|
|
|
If you choose to enter a password now then this prompt \
|
|
|
|
will be raised next time the validator is started.",
|
|
|
|
CONFIG_FILENAME
|
|
|
|
);
|
2021-02-15 00:09:12 +00:00
|
|
|
eprintln!();
|
2020-07-22 09:34:55 +00:00
|
|
|
eprintln!("Enter password (or press Ctrl+c to exit):");
|
|
|
|
|
|
|
|
loop {
|
2020-07-29 04:32:50 +00:00
|
|
|
let password =
|
|
|
|
read_password_from_user(USE_STDIN).map_err(Error::UnableToReadPasswordFromUser)?;
|
2020-07-22 09:34:55 +00:00
|
|
|
|
2021-02-15 00:09:12 +00:00
|
|
|
eprintln!();
|
2020-07-22 09:34:55 +00:00
|
|
|
|
|
|
|
match keystore.decrypt_keypair(password.as_ref()) {
|
2020-10-05 10:50:43 +00:00
|
|
|
Ok(keystore) => break Ok((password, keystore)),
|
2020-07-22 09:34:55 +00:00
|
|
|
Err(eth2_keystore::Error::InvalidPassword) => {
|
|
|
|
eprintln!("Invalid password, try again (or press Ctrl+c to exit):");
|
|
|
|
}
|
|
|
|
Err(e) => return Err(Error::UnableToDecryptKeystore(e)),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// A set of `InitializedValidator` objects which is initialized from a list of
|
|
|
|
/// `ValidatorDefinition`. The `ValidatorDefinition` file is maintained as `self` is modified.
|
|
|
|
///
|
|
|
|
/// Forms the fundamental list of validators that are managed by this validator client instance.
|
|
|
|
pub struct InitializedValidators {
|
|
|
|
/// A list of validator definitions which can be stored on-disk.
|
|
|
|
definitions: ValidatorDefinitions,
|
|
|
|
/// The directory that the `self.definitions` will be saved into.
|
|
|
|
validators_dir: PathBuf,
|
|
|
|
/// The canonical set of validators.
|
2021-03-17 05:09:57 +00:00
|
|
|
validators: HashMap<PublicKeyBytes, InitializedValidator>,
|
2020-07-22 09:34:55 +00:00
|
|
|
/// For logging via `slog`.
|
|
|
|
log: Logger,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl InitializedValidators {
|
|
|
|
/// Instantiates `Self`, initializing all validators in `definitions`.
|
2020-09-24 04:06:02 +00:00
|
|
|
pub async fn from_definitions(
|
2020-07-22 09:34:55 +00:00
|
|
|
definitions: ValidatorDefinitions,
|
|
|
|
validators_dir: PathBuf,
|
|
|
|
log: Logger,
|
|
|
|
) -> Result<Self, Error> {
|
|
|
|
let mut this = Self {
|
|
|
|
validators_dir,
|
|
|
|
definitions,
|
|
|
|
validators: HashMap::default(),
|
|
|
|
log,
|
|
|
|
};
|
2020-09-24 04:06:02 +00:00
|
|
|
this.update_validators().await?;
|
2020-07-22 09:34:55 +00:00
|
|
|
Ok(this)
|
|
|
|
}
|
|
|
|
|
|
|
|
/// The count of enabled validators contained in `self`.
|
|
|
|
pub fn num_enabled(&self) -> usize {
|
|
|
|
self.validators.len()
|
|
|
|
}
|
|
|
|
|
|
|
|
/// The total count of enabled and disabled validators contained in `self`.
|
|
|
|
pub fn num_total(&self) -> usize {
|
|
|
|
self.definitions.as_slice().len()
|
|
|
|
}
|
|
|
|
|
2021-07-31 03:50:52 +00:00
|
|
|
/// Iterate through all voting public keys in `self` that should be used when querying for duties.
|
2021-03-17 05:09:57 +00:00
|
|
|
pub fn iter_voting_pubkeys(&self) -> impl Iterator<Item = &PublicKeyBytes> {
|
2020-07-22 09:34:55 +00:00
|
|
|
self.validators.iter().map(|(pubkey, _)| pubkey)
|
|
|
|
}
|
|
|
|
|
2021-09-16 03:26:33 +00:00
|
|
|
/// Returns the voting `Keypair` for a given voting `PublicKey`, if all are true:
|
|
|
|
///
|
|
|
|
/// - The validator is known to `self`.
|
|
|
|
/// - The validator is enabled.
|
|
|
|
pub fn signing_method(&self, voting_public_key: &PublicKeyBytes) -> Option<Arc<SigningMethod>> {
|
2020-07-22 09:34:55 +00:00
|
|
|
self.validators
|
|
|
|
.get(voting_public_key)
|
2021-09-16 03:26:33 +00:00
|
|
|
.map(|v| v.signing_method.clone())
|
2020-07-22 09:34:55 +00:00
|
|
|
}
|
|
|
|
|
2022-01-30 23:22:04 +00:00
|
|
|
/// Add a validator definition to `self`, replacing any disabled definition with the same
|
|
|
|
/// voting public key.
|
|
|
|
///
|
|
|
|
/// The on-disk representation of the validator definitions & the key cache will both be
|
|
|
|
/// updated.
|
|
|
|
pub async fn add_definition_replace_disabled(
|
|
|
|
&mut self,
|
|
|
|
def: ValidatorDefinition,
|
|
|
|
) -> Result<(), Error> {
|
|
|
|
// Drop any disabled definitions with the same public key.
|
|
|
|
let delete_def = |existing_def: &ValidatorDefinition| {
|
|
|
|
!existing_def.enabled && existing_def.voting_public_key == def.voting_public_key
|
|
|
|
};
|
|
|
|
self.definitions.retain(|def| !delete_def(def));
|
|
|
|
|
|
|
|
// Add the definition.
|
|
|
|
self.add_definition(def).await
|
|
|
|
}
|
|
|
|
|
2020-10-02 09:42:19 +00:00
|
|
|
/// Add a validator definition to `self`, overwriting the on-disk representation of `self`.
|
|
|
|
pub async fn add_definition(&mut self, def: ValidatorDefinition) -> Result<(), Error> {
|
|
|
|
if self
|
|
|
|
.definitions
|
|
|
|
.as_slice()
|
|
|
|
.iter()
|
|
|
|
.any(|existing| existing.voting_public_key == def.voting_public_key)
|
|
|
|
{
|
|
|
|
return Err(Error::DuplicatePublicKey);
|
|
|
|
}
|
|
|
|
|
|
|
|
self.definitions.push(def);
|
|
|
|
|
|
|
|
self.update_validators().await?;
|
|
|
|
|
|
|
|
self.definitions
|
|
|
|
.save(&self.validators_dir)
|
|
|
|
.map_err(Error::UnableToSaveDefinitions)?;
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2022-01-30 23:22:04 +00:00
|
|
|
/// Delete the validator definition and keystore for `pubkey`.
|
|
|
|
///
|
|
|
|
/// The delete is carried out in stages so that the filesystem is never left in an inconsistent
|
|
|
|
/// state, even in case of errors or crashes.
|
|
|
|
pub async fn delete_definition_and_keystore(
|
|
|
|
&mut self,
|
|
|
|
pubkey: &PublicKey,
|
2022-05-09 07:21:38 +00:00
|
|
|
is_local_keystore: bool,
|
|
|
|
) -> Result<(), Error> {
|
2022-01-30 23:22:04 +00:00
|
|
|
// 1. Disable the validator definition.
|
|
|
|
//
|
|
|
|
// We disable before removing so that in case of a crash the auto-discovery mechanism
|
|
|
|
// won't re-activate the keystore.
|
|
|
|
if let Some(def) = self
|
|
|
|
.definitions
|
|
|
|
.as_mut_slice()
|
|
|
|
.iter_mut()
|
|
|
|
.find(|def| &def.voting_public_key == pubkey)
|
|
|
|
{
|
2022-05-09 07:21:38 +00:00
|
|
|
// Update definition for local keystore
|
|
|
|
if def.signing_definition.is_local_keystore() && is_local_keystore {
|
2022-01-30 23:22:04 +00:00
|
|
|
def.enabled = false;
|
|
|
|
self.definitions
|
|
|
|
.save(&self.validators_dir)
|
|
|
|
.map_err(Error::UnableToSaveDefinitions)?;
|
2022-05-09 07:21:38 +00:00
|
|
|
} else if !def.signing_definition.is_local_keystore() && !is_local_keystore {
|
|
|
|
def.enabled = false;
|
2022-01-30 23:22:04 +00:00
|
|
|
} else {
|
2022-05-09 07:21:38 +00:00
|
|
|
return Err(Error::InvalidActionOnValidator);
|
2022-01-30 23:22:04 +00:00
|
|
|
}
|
|
|
|
} else {
|
2022-05-09 07:21:38 +00:00
|
|
|
return Err(Error::ValidatorNotInitialized(pubkey.clone()));
|
2022-01-30 23:22:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// 2. Delete from `self.validators`, which holds the signing method.
|
|
|
|
// Delete the keystore files.
|
|
|
|
if let Some(initialized_validator) = self.validators.remove(&pubkey.compress()) {
|
|
|
|
if let SigningMethod::LocalKeystore {
|
|
|
|
ref voting_keystore_path,
|
|
|
|
ref voting_keystore_lockfile,
|
|
|
|
ref voting_keystore,
|
|
|
|
..
|
|
|
|
} = *initialized_validator.signing_method
|
|
|
|
{
|
|
|
|
// Drop the lock file so that it may be deleted. This is particularly important on
|
|
|
|
// Windows where the lockfile will fail to be deleted if it is still open.
|
|
|
|
drop(voting_keystore_lockfile.lock().take());
|
|
|
|
|
|
|
|
self.delete_keystore_or_validator_dir(voting_keystore_path, voting_keystore)?;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// 3. Delete from validator definitions entirely.
|
|
|
|
self.definitions
|
|
|
|
.retain(|def| &def.voting_public_key != pubkey);
|
|
|
|
self.definitions
|
|
|
|
.save(&self.validators_dir)
|
|
|
|
.map_err(Error::UnableToSaveDefinitions)?;
|
|
|
|
|
2022-05-09 07:21:38 +00:00
|
|
|
Ok(())
|
2022-01-30 23:22:04 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Attempt to delete the voting keystore file, or its entire validator directory.
|
|
|
|
///
|
|
|
|
/// Some parts of the VC assume the existence of a validator based on the existence of a
|
|
|
|
/// directory in the validators dir named like a public key.
|
|
|
|
fn delete_keystore_or_validator_dir(
|
|
|
|
&self,
|
|
|
|
voting_keystore_path: &Path,
|
|
|
|
voting_keystore: &Keystore,
|
|
|
|
) -> Result<(), Error> {
|
|
|
|
// If the parent directory is a `ValidatorDir` within `self.validators_dir`, then
|
|
|
|
// delete the entire directory so that it may be recreated if the keystore is
|
|
|
|
// re-imported.
|
|
|
|
if let Some(validator_dir) = voting_keystore_path.parent() {
|
|
|
|
if validator_dir
|
|
|
|
== ValidatorDirBuilder::get_dir_path(&self.validators_dir, voting_keystore)
|
|
|
|
{
|
|
|
|
fs::remove_dir_all(validator_dir)
|
|
|
|
.map_err(|e| Error::UnableToDeleteValidatorDir(validator_dir.into(), e))?;
|
|
|
|
return Ok(());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// Otherwise just delete the keystore file.
|
|
|
|
fs::remove_file(voting_keystore_path)
|
|
|
|
.map_err(|e| Error::UnableToDeleteKeystore(voting_keystore_path.into(), e))?;
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2020-10-02 09:42:19 +00:00
|
|
|
/// Returns a slice of all defined validators (regardless of their enabled state).
|
|
|
|
pub fn validator_definitions(&self) -> &[ValidatorDefinition] {
|
|
|
|
self.definitions.as_slice()
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Indicates if the `voting_public_key` exists in self and if it is enabled.
|
|
|
|
pub fn is_enabled(&self, voting_public_key: &PublicKey) -> Option<bool> {
|
|
|
|
self.definitions
|
|
|
|
.as_slice()
|
|
|
|
.iter()
|
|
|
|
.find(|def| def.voting_public_key == *voting_public_key)
|
|
|
|
.map(|def| def.enabled)
|
|
|
|
}
|
|
|
|
|
2021-03-02 22:35:46 +00:00
|
|
|
/// Returns the `graffiti` for a given public key specified in the `ValidatorDefinitions`.
|
2021-03-17 05:09:57 +00:00
|
|
|
pub fn graffiti(&self, public_key: &PublicKeyBytes) -> Option<Graffiti> {
|
2021-03-02 22:35:46 +00:00
|
|
|
self.validators.get(public_key).and_then(|v| v.graffiti)
|
|
|
|
}
|
|
|
|
|
2022-02-08 19:52:20 +00:00
|
|
|
/// Returns the `suggested_fee_recipient` for a given public key specified in the
|
|
|
|
/// `ValidatorDefinitions`.
|
|
|
|
pub fn suggested_fee_recipient(&self, public_key: &PublicKeyBytes) -> Option<Address> {
|
|
|
|
self.validators
|
|
|
|
.get(public_key)
|
|
|
|
.and_then(|v| v.suggested_fee_recipient)
|
|
|
|
}
|
|
|
|
|
2020-07-22 09:34:55 +00:00
|
|
|
/// Sets the `InitializedValidator` and `ValidatorDefinition` `enabled` values.
|
|
|
|
///
|
|
|
|
/// ## Notes
|
|
|
|
///
|
|
|
|
/// Enabling or disabling a validator will cause `self.definitions` to be updated and saved to
|
|
|
|
/// disk. A newly enabled validator will be added to `self.validators`, whilst a newly disabled
|
|
|
|
/// validator will be removed from `self.validators`.
|
|
|
|
///
|
|
|
|
/// Saves the `ValidatorDefinitions` to file, even if no definitions were changed.
|
2020-09-24 04:06:02 +00:00
|
|
|
pub async fn set_validator_status(
|
2020-07-22 09:34:55 +00:00
|
|
|
&mut self,
|
|
|
|
voting_public_key: &PublicKey,
|
|
|
|
enabled: bool,
|
|
|
|
) -> Result<(), Error> {
|
2020-07-23 14:18:00 +00:00
|
|
|
if let Some(def) = self
|
|
|
|
.definitions
|
2020-07-22 09:34:55 +00:00
|
|
|
.as_mut_slice()
|
|
|
|
.iter_mut()
|
|
|
|
.find(|def| def.voting_public_key == *voting_public_key)
|
2020-07-23 14:18:00 +00:00
|
|
|
{
|
|
|
|
def.enabled = enabled;
|
|
|
|
}
|
2020-07-22 09:34:55 +00:00
|
|
|
|
2020-09-24 04:06:02 +00:00
|
|
|
self.update_validators().await?;
|
2020-07-22 09:34:55 +00:00
|
|
|
|
|
|
|
self.definitions
|
|
|
|
.save(&self.validators_dir)
|
|
|
|
.map_err(Error::UnableToSaveDefinitions)?;
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2020-10-05 10:50:43 +00:00
|
|
|
/// Tries to decrypt the key cache.
|
|
|
|
///
|
2022-01-30 23:22:04 +00:00
|
|
|
/// Returns the decrypted cache if decryption was successful, or an error if a required password
|
|
|
|
/// wasn't provided and couldn't be read interactively.
|
|
|
|
///
|
|
|
|
/// In the case that the cache contains UUIDs for unknown validator definitions then it cannot
|
|
|
|
/// be decrypted and will be replaced by a new empty cache.
|
2020-10-05 10:50:43 +00:00
|
|
|
///
|
2022-01-30 23:22:04 +00:00
|
|
|
/// The mutable `key_stores` argument will be used to accelerate decyption by bypassing
|
|
|
|
/// filesystem accesses for keystores that are already known. In the case that a keystore
|
|
|
|
/// from the validator definitions is not yet in this map, it will be loaded from disk and
|
|
|
|
/// inserted into the map.
|
2020-10-05 10:50:43 +00:00
|
|
|
async fn decrypt_key_cache(
|
|
|
|
&self,
|
|
|
|
mut cache: KeyCache,
|
|
|
|
key_stores: &mut HashMap<PathBuf, Keystore>,
|
|
|
|
) -> Result<KeyCache, Error> {
|
2022-01-30 23:22:04 +00:00
|
|
|
// Read relevant key stores from the filesystem.
|
2020-10-05 10:50:43 +00:00
|
|
|
let mut definitions_map = HashMap::new();
|
2022-01-30 23:22:04 +00:00
|
|
|
for def in self.definitions.as_slice().iter().filter(|def| def.enabled) {
|
2020-10-05 10:50:43 +00:00
|
|
|
match &def.signing_definition {
|
|
|
|
SigningDefinition::LocalKeystore {
|
|
|
|
voting_keystore_path,
|
|
|
|
..
|
|
|
|
} => {
|
|
|
|
use std::collections::hash_map::Entry::*;
|
|
|
|
let key_store = match key_stores.entry(voting_keystore_path.clone()) {
|
|
|
|
Vacant(entry) => entry.insert(open_keystore(voting_keystore_path)?),
|
|
|
|
Occupied(entry) => entry.into_mut(),
|
|
|
|
};
|
|
|
|
definitions_map.insert(*key_store.uuid(), def);
|
|
|
|
}
|
2021-09-16 03:26:33 +00:00
|
|
|
// Remote signer validators don't interact with the key cache.
|
|
|
|
SigningDefinition::Web3Signer { .. } => (),
|
2020-10-05 10:50:43 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
//check if all paths are in the definitions_map
|
|
|
|
for uuid in cache.uuids() {
|
|
|
|
if !definitions_map.contains_key(uuid) {
|
2022-01-30 23:22:04 +00:00
|
|
|
debug!(
|
2020-10-05 10:50:43 +00:00
|
|
|
self.log,
|
2022-01-30 23:22:04 +00:00
|
|
|
"Resetting the key cache";
|
|
|
|
"keystore_uuid" => %uuid,
|
|
|
|
"reason" => "impossible to decrypt due to missing keystore",
|
2020-10-05 10:50:43 +00:00
|
|
|
);
|
|
|
|
return Ok(KeyCache::new());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
//collect passwords
|
|
|
|
let mut passwords = Vec::new();
|
|
|
|
let mut public_keys = Vec::new();
|
|
|
|
for uuid in cache.uuids() {
|
|
|
|
let def = definitions_map.get(uuid).expect("Existence checked before");
|
2021-09-16 03:26:33 +00:00
|
|
|
match &def.signing_definition {
|
2020-10-05 10:50:43 +00:00
|
|
|
SigningDefinition::LocalKeystore {
|
|
|
|
voting_keystore_password_path,
|
|
|
|
voting_keystore_password,
|
|
|
|
voting_keystore_path,
|
|
|
|
} => {
|
2021-09-16 03:26:33 +00:00
|
|
|
let pw = if let Some(p) = voting_keystore_password {
|
2020-10-05 10:50:43 +00:00
|
|
|
p.as_ref().to_vec().into()
|
|
|
|
} else if let Some(path) = voting_keystore_password_path {
|
|
|
|
read_password(path).map_err(Error::UnableToReadVotingKeystorePassword)?
|
|
|
|
} else {
|
|
|
|
let keystore = open_keystore(voting_keystore_path)?;
|
2021-07-30 01:11:47 +00:00
|
|
|
unlock_keystore_via_stdin_password(&keystore, voting_keystore_path)?
|
2020-10-05 10:50:43 +00:00
|
|
|
.0
|
|
|
|
.as_ref()
|
|
|
|
.to_vec()
|
|
|
|
.into()
|
2021-09-16 03:26:33 +00:00
|
|
|
};
|
|
|
|
passwords.push(pw);
|
|
|
|
public_keys.push(def.voting_public_key.clone());
|
2020-10-05 10:50:43 +00:00
|
|
|
}
|
2021-09-16 03:26:33 +00:00
|
|
|
// Remote signer validators don't interact with the key cache.
|
|
|
|
SigningDefinition::Web3Signer { .. } => (),
|
2020-10-05 10:50:43 +00:00
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
//decrypt
|
|
|
|
tokio::task::spawn_blocking(move || match cache.decrypt(passwords, public_keys) {
|
|
|
|
Ok(_) | Err(key_cache::Error::AlreadyDecrypted) => cache,
|
|
|
|
_ => KeyCache::new(),
|
|
|
|
})
|
|
|
|
.await
|
|
|
|
.map_err(Error::TokioJoin)
|
|
|
|
}
|
|
|
|
|
2020-07-22 09:34:55 +00:00
|
|
|
/// Scans `self.definitions` and attempts to initialize and validators which are not already
|
|
|
|
/// initialized.
|
|
|
|
///
|
|
|
|
/// The function exits early with an error if any enabled validator is unable to be
|
|
|
|
/// initialized.
|
|
|
|
///
|
|
|
|
/// ## Notes
|
|
|
|
///
|
|
|
|
/// A validator is considered "already known" and skipped if the public key is already known.
|
|
|
|
/// I.e., if there are two different definitions with the same public key then the second will
|
|
|
|
/// be ignored.
|
2022-01-30 23:22:04 +00:00
|
|
|
pub(crate) async fn update_validators(&mut self) -> Result<(), Error> {
|
2020-10-05 10:50:43 +00:00
|
|
|
//use key cache if available
|
|
|
|
let mut key_stores = HashMap::new();
|
|
|
|
|
|
|
|
// Create a lock file for the cache
|
|
|
|
let key_cache_path = KeyCache::cache_file_path(&self.validators_dir);
|
2020-12-03 01:10:26 +00:00
|
|
|
let cache_lockfile_path =
|
|
|
|
get_lockfile_path(&key_cache_path).ok_or(Error::BadKeyCachePath(key_cache_path))?;
|
2020-11-26 11:25:46 +00:00
|
|
|
let _cache_lockfile = Lockfile::new(cache_lockfile_path)?;
|
|
|
|
|
|
|
|
let cache =
|
|
|
|
KeyCache::open_or_create(&self.validators_dir).map_err(Error::UnableToOpenKeyCache)?;
|
|
|
|
let mut key_cache = self.decrypt_key_cache(cache, &mut key_stores).await?;
|
2020-10-05 10:50:43 +00:00
|
|
|
|
|
|
|
let mut disabled_uuids = HashSet::new();
|
2020-07-22 09:34:55 +00:00
|
|
|
for def in self.definitions.as_slice() {
|
|
|
|
if def.enabled {
|
|
|
|
match &def.signing_definition {
|
2020-10-05 10:50:43 +00:00
|
|
|
SigningDefinition::LocalKeystore {
|
|
|
|
voting_keystore_path,
|
|
|
|
..
|
|
|
|
} => {
|
2021-03-17 05:09:57 +00:00
|
|
|
let pubkey_bytes = def.voting_public_key.compress();
|
|
|
|
|
|
|
|
if self.validators.contains_key(&pubkey_bytes) {
|
2020-07-22 09:34:55 +00:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2020-10-05 10:50:43 +00:00
|
|
|
if let Some(key_store) = key_stores.get(voting_keystore_path) {
|
|
|
|
disabled_uuids.remove(key_store.uuid());
|
|
|
|
}
|
2020-09-24 04:06:02 +00:00
|
|
|
|
2020-10-05 10:50:43 +00:00
|
|
|
match InitializedValidator::from_definition(
|
|
|
|
def.clone(),
|
|
|
|
&mut key_cache,
|
|
|
|
&mut key_stores,
|
|
|
|
)
|
|
|
|
.await
|
|
|
|
{
|
2020-07-22 09:34:55 +00:00
|
|
|
Ok(init) => {
|
2020-11-26 11:25:46 +00:00
|
|
|
let existing_lockfile_path = init
|
|
|
|
.keystore_lockfile()
|
|
|
|
.as_ref()
|
|
|
|
.filter(|l| l.file_existed())
|
|
|
|
.map(|l| l.path().to_owned());
|
|
|
|
|
2020-07-22 09:34:55 +00:00
|
|
|
self.validators
|
2021-03-17 05:09:57 +00:00
|
|
|
.insert(init.voting_public_key().compress(), init);
|
2020-07-22 09:34:55 +00:00
|
|
|
info!(
|
|
|
|
self.log,
|
|
|
|
"Enabled validator";
|
2021-09-16 03:26:33 +00:00
|
|
|
"signing_method" => "local_keystore",
|
2021-03-02 22:35:46 +00:00
|
|
|
"voting_pubkey" => format!("{:?}", def.voting_public_key),
|
2020-07-22 09:34:55 +00:00
|
|
|
);
|
2020-11-26 11:25:46 +00:00
|
|
|
|
|
|
|
if let Some(lockfile_path) = existing_lockfile_path {
|
|
|
|
warn!(
|
|
|
|
self.log,
|
|
|
|
"Ignored stale lockfile";
|
|
|
|
"path" => lockfile_path.display(),
|
|
|
|
"cause" => "Ungraceful shutdown (harmless) OR \
|
|
|
|
non-Lighthouse client using this keystore \
|
|
|
|
(risky)"
|
|
|
|
);
|
|
|
|
}
|
2020-07-22 09:34:55 +00:00
|
|
|
}
|
|
|
|
Err(e) => {
|
|
|
|
error!(
|
|
|
|
self.log,
|
|
|
|
"Failed to initialize validator";
|
|
|
|
"error" => format!("{:?}", e),
|
2021-09-16 03:26:33 +00:00
|
|
|
"signing_method" => "local_keystore",
|
|
|
|
"validator" => format!("{:?}", def.voting_public_key)
|
|
|
|
);
|
|
|
|
|
|
|
|
// Exit on an invalid validator.
|
|
|
|
return Err(e);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
SigningDefinition::Web3Signer { .. } => {
|
|
|
|
match InitializedValidator::from_definition(
|
|
|
|
def.clone(),
|
|
|
|
&mut key_cache,
|
|
|
|
&mut key_stores,
|
|
|
|
)
|
|
|
|
.await
|
|
|
|
{
|
|
|
|
Ok(init) => {
|
|
|
|
self.validators
|
|
|
|
.insert(init.voting_public_key().compress(), init);
|
|
|
|
|
|
|
|
info!(
|
|
|
|
self.log,
|
|
|
|
"Enabled validator";
|
|
|
|
"signing_method" => "remote_signer",
|
|
|
|
"voting_pubkey" => format!("{:?}", def.voting_public_key),
|
|
|
|
);
|
|
|
|
}
|
|
|
|
Err(e) => {
|
|
|
|
error!(
|
|
|
|
self.log,
|
|
|
|
"Failed to initialize validator";
|
|
|
|
"error" => format!("{:?}", e),
|
|
|
|
"signing_method" => "remote_signer",
|
2020-07-22 09:34:55 +00:00
|
|
|
"validator" => format!("{:?}", def.voting_public_key)
|
|
|
|
);
|
|
|
|
|
|
|
|
// Exit on an invalid validator.
|
|
|
|
return Err(e);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
2021-03-17 05:09:57 +00:00
|
|
|
self.validators.remove(&def.voting_public_key.compress());
|
2020-10-05 10:50:43 +00:00
|
|
|
match &def.signing_definition {
|
|
|
|
SigningDefinition::LocalKeystore {
|
|
|
|
voting_keystore_path,
|
|
|
|
..
|
|
|
|
} => {
|
|
|
|
if let Some(key_store) = key_stores.get(voting_keystore_path) {
|
|
|
|
disabled_uuids.insert(*key_store.uuid());
|
|
|
|
}
|
|
|
|
}
|
2021-09-16 03:26:33 +00:00
|
|
|
// Remote signers do not interact with the key cache.
|
|
|
|
SigningDefinition::Web3Signer { .. } => (),
|
2020-10-05 10:50:43 +00:00
|
|
|
}
|
|
|
|
|
2020-07-22 09:34:55 +00:00
|
|
|
info!(
|
|
|
|
self.log,
|
|
|
|
"Disabled validator";
|
|
|
|
"voting_pubkey" => format!("{:?}", def.voting_public_key)
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
2020-10-05 10:50:43 +00:00
|
|
|
for uuid in disabled_uuids {
|
|
|
|
key_cache.remove(&uuid);
|
|
|
|
}
|
|
|
|
|
|
|
|
let validators_dir = self.validators_dir.clone();
|
|
|
|
let log = self.log.clone();
|
|
|
|
if key_cache.is_modified() {
|
|
|
|
tokio::task::spawn_blocking(move || {
|
|
|
|
match key_cache.save(validators_dir) {
|
|
|
|
Err(e) => warn!(
|
|
|
|
log,
|
|
|
|
"Error during saving of key_cache";
|
|
|
|
"err" => format!("{:?}", e)
|
|
|
|
),
|
|
|
|
Ok(true) => info!(log, "Modified key_cache saved successfully"),
|
|
|
|
_ => {}
|
|
|
|
};
|
|
|
|
})
|
|
|
|
.await
|
|
|
|
.map_err(Error::TokioJoin)?;
|
|
|
|
} else {
|
|
|
|
debug!(log, "Key cache not modified");
|
|
|
|
}
|
2021-05-26 05:58:41 +00:00
|
|
|
|
|
|
|
// Update the enabled and total validator counts
|
|
|
|
set_gauge(
|
|
|
|
&crate::http_metrics::metrics::ENABLED_VALIDATORS_COUNT,
|
|
|
|
self.num_enabled() as i64,
|
|
|
|
);
|
|
|
|
set_gauge(
|
|
|
|
&crate::http_metrics::metrics::TOTAL_VALIDATORS_COUNT,
|
|
|
|
self.num_total() as i64,
|
|
|
|
);
|
2020-07-22 09:34:55 +00:00
|
|
|
Ok(())
|
|
|
|
}
|
2021-07-31 03:50:52 +00:00
|
|
|
|
|
|
|
pub fn get_index(&self, pubkey: &PublicKeyBytes) -> Option<u64> {
|
|
|
|
self.validators.get(pubkey).and_then(|val| val.index)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn set_index(&mut self, pubkey: &PublicKeyBytes, index: u64) {
|
|
|
|
if let Some(val) = self.validators.get_mut(pubkey) {
|
|
|
|
val.index = Some(index);
|
|
|
|
}
|
|
|
|
}
|
2020-07-22 09:34:55 +00:00
|
|
|
}
|