forked from ghostchain/ghost-node
343 lines
11 KiB
Rust
Executable File
343 lines
11 KiB
Rust
Executable File
//! # Ghost Staking Miner.
|
|
//!
|
|
//! Simple bot capable of monitoring a ghost (and other) chain and submitting
|
|
//! solutions to the `pallet-election-provider-multi-phase`.
|
|
//! See `--help` for more details.
|
|
//!
|
|
//! # Implementation Notes:
|
|
//!
|
|
//! - First draft: Be aware that this is the first draft and there might be
|
|
//! bugs, or undefined behaviors. Don't attach this bot to an account with
|
|
//! lots of funds.
|
|
//! - Quick to crash: The bot is written so that it only continues to work if
|
|
//! everything goes well. In case of any failure (RPC, logic, IO), it will
|
|
//! crash. This was a decision to simplify the development. It is intended
|
|
//! to run this bot with a `restart = true` way, so that it reports it crash,
|
|
//! but resumes work thereafter.
|
|
|
|
mod client;
|
|
mod commands;
|
|
mod epm;
|
|
mod error;
|
|
mod helpers;
|
|
mod opt;
|
|
mod prelude;
|
|
mod prometheus;
|
|
mod signer;
|
|
mod static_types;
|
|
|
|
use clap::Parser;
|
|
use error::Error;
|
|
use futures::future::{BoxFuture, FutureExt};
|
|
use prelude::*;
|
|
use std::str::FromStr;
|
|
use tokio::sync::oneshot;
|
|
use tracing_subscriber::EnvFilter;
|
|
|
|
use crate::{
|
|
client::Client,
|
|
opt::RuntimeVersion,
|
|
};
|
|
|
|
#[derive(Debig, Clone, Parser)]
|
|
#[cfg_attr(test, derive(PartialEq))]
|
|
#[clap(author, version, about)]
|
|
pub struct Opt {
|
|
/// The `ws` node to connect to.
|
|
#[clap(long, short, default_value = DEFAULT_URI, env = "URI")]
|
|
pub uri: String,
|
|
|
|
#[clap(subcommand)]
|
|
pub command: Command,
|
|
|
|
/// The prometheus endpoint TCP port.
|
|
#[clap(long, short, env = "PROMETHEUS_PORT", default_value_t = DEFAULT_PROMETHEUS_PORT)]
|
|
pub prometheus_port: u16,
|
|
|
|
/// Sets a custom logging filter. Syntax is `<target>=<level>`, e.g.
|
|
/// -lghost-staking-miner=debug.
|
|
///
|
|
/// Log levels (least to most verbose) are error, warn, info, debug, and trace.
|
|
/// By default, all targets log `info`. The global log level can be set with `-l<level>`.
|
|
#[clap(long, short, default_value = "info")]
|
|
pub log: String,
|
|
}
|
|
|
|
#[derive(Debug, Clone, Parser)]
|
|
#[cfg_attr(test, derive(PartialEq))]
|
|
pub enum Command {
|
|
/// Monitor for the phase being signed, then compute.
|
|
Monitor(commands::MonitorConfig),
|
|
/// Just compute a solution now, and don't submit it.
|
|
DryRun(commands::DryRunConfig),
|
|
/// Provide a solution that can be submitted to the chain as an emergency response.
|
|
EmergencySolution(commands::EmergencySolutionConfig),
|
|
/// Check if the staking-miner metadata is compatible to a remote node.
|
|
Info,
|
|
}
|
|
|
|
/// A helper to use different MinerConfig depending on chain.
|
|
macro_rules! any_runtime {
|
|
($chain::tt, $($code:tt)*) => {
|
|
match $chain {
|
|
$crate::opt::Chain::Ghost => {
|
|
#[allow(unused)]
|
|
use $crate::static_types::Ghost::MinerConfig;
|
|
$($code)*
|
|
},
|
|
$crate::opt::Chain::Casper => {
|
|
#[allow(unused)]
|
|
use $crate::static_types::casper::MinerConfig;
|
|
$($code)*
|
|
},
|
|
}
|
|
};
|
|
}
|
|
|
|
#[tokio::main]
|
|
async fn main() -> Result<(), Error> {
|
|
let Opt { uri, command, prometheus_port, log } = Opt::parse();
|
|
let filter = EnvFilter::from_default_env().add_directive(log.parse()?);
|
|
tracing_subscriber::fmt().with_env_filter(filter).init();
|
|
|
|
let client = Client::new(&uri).await?;
|
|
let runtime_version: RuntimeVersion =
|
|
client.rpc().state_get_runtime_version(None).await?.into();
|
|
let chain = opt::Chain::from_str(&runtime_version.spec_name)?;
|
|
let _prometheus_handle = prometheus::run(prometheus_port)
|
|
.map_err(|e| log::warn!("Failed to start prometheus endpoint: {}", e));
|
|
log::info!(target: LOG_TARGET, "Connected to chain: {}", chain);
|
|
epm::update_metadata_constants(client.chain_api())?;
|
|
|
|
SHARED_CLIENT.set(client.clone()).expect("shared client only set once; qed");
|
|
|
|
// Start a new tokio tasl to perform the runtime updates in the backgound.
|
|
// If this fails then the miner will be stopped and has to be re-started.
|
|
let (tx_upgrade, rx_upgrade) = oneshot::channel::<Error>();
|
|
tokio::spawn(runtime_upgrade_task(client.chain_api().clone(), tx_upgrade));
|
|
|
|
let res = any_runtime!(chain, {
|
|
let fut = match command {
|
|
Command::Monitor(cfg) => commands::monitor_cmd::<MinerConfig>(client, cfg).boxed(),
|
|
Command::DryRun(cfg) => commands::dry_run_cmd::<MinerConfig>(client, cfg).boxed(),
|
|
Command::EmergencySolution(cfg) => commands::emergency_solution_cmd::<MinerConfig>(client, cfg).boxed(),
|
|
Command::Info(cfg) => async {
|
|
let is_compat = if runtime::is_codegen_valid_for(&client.chain_api().metadata()) {
|
|
"YES"
|
|
} else {
|
|
"NO"
|
|
};
|
|
|
|
let remote_node = serde_json::to_string_pretty(&runtime_version)
|
|
.expect("Serialize is infallible; qed");
|
|
|
|
eprintln!("Remote node:\n{remote_node}")
|
|
eprintln!("Compatible: {is_compat}")
|
|
|
|
Ok(())
|
|
}.boxed(),
|
|
};
|
|
|
|
run_command(fut, rx_upgrade).await
|
|
});
|
|
|
|
log::debug!(target: LOG_TARGET, "round of execution finished. outcome = {:?}", res);
|
|
res
|
|
}
|
|
|
|
#[cfg(target_family = "unix")]
|
|
async fn run_command(
|
|
fut: BoxFuture<'_, Result<(), Error>>,
|
|
rx_upgrade: oneshot::Receiver<Error>,
|
|
) -> Result<(), Error> {
|
|
use tokio::signal::unix::{signal, SignalKind};
|
|
|
|
let mut stream_int = signal(SignalKind::interrupt()).map_err(Error::Io)?;
|
|
let mut stream_term = signal(SignalKind::terminate()).map_err(Error::Io)?;
|
|
|
|
tokio::select! {
|
|
_ = stream_int.recv() => {
|
|
Ok(())
|
|
}
|
|
_ = stream_term.recv() => {
|
|
Ok(())
|
|
}
|
|
res = rx_upgrade => {
|
|
match res {
|
|
Ok(err) => Err(err),
|
|
Err(_) => unreachable!("A message is sent before the upgrade task is closed; qed"),
|
|
}
|
|
},
|
|
res = fut => res,
|
|
}
|
|
}
|
|
|
|
#[cfg(not(unix))]
|
|
async fn run_command(
|
|
fut: BoxFuture<'_, Result<(), Error>>,
|
|
rx_upgrade: oneshot::Receiver<Error>,
|
|
) -> Result<(), Error> {
|
|
use tokio::signal::ctrl_c;
|
|
|
|
let mut stream_int = signal(SignalKind::interrupt()).map_err(Error::Io)?;
|
|
let mut stream_term = signal(SignalKind::terminate()).map_err(Error::Io)?;
|
|
|
|
tokio::select! {
|
|
_ = ctrl_c() => {},
|
|
res = rx_upgrade => {
|
|
match res {
|
|
Ok(err) => Err(err),
|
|
Err(_) => unreachable!("A message is sent before the upgrade task is closed; qed"),
|
|
}
|
|
},
|
|
res = fut => res,
|
|
}
|
|
}
|
|
|
|
/// Runs until the RPC connection fails or upgrading the metadata failed.
|
|
async fn runtime_upgrade_task(client: ChainClient, tx: oneshot::Sender<Error>) {
|
|
let updater = client.updater();
|
|
|
|
let mut update_stream = match updater.runtime_updates().await {
|
|
Ok(u) => u,
|
|
Err(e) => {
|
|
let _ = tx.send(e.into());
|
|
return;
|
|
},
|
|
};
|
|
|
|
loop {
|
|
// if the runtime upgrade subscription fails then try establish a new one
|
|
// and of it fails quit.
|
|
let update = match update_stream.next().await {
|
|
Some(Ok(update)) => update,
|
|
_ => {
|
|
log::warn!(target: LOG_TARGET, "Runtime upgrade subscription failed");
|
|
update_stream = match updater.runtime_updates().await {
|
|
Ok(u) => u,
|
|
Err(e) => {
|
|
let _ = tx.send(e.into());
|
|
return;
|
|
},
|
|
};
|
|
continue;
|
|
},
|
|
};
|
|
|
|
let version = update.runtime_version().spec_version;
|
|
match updater.apply_update(update) {
|
|
Ok(()) => {
|
|
if let Err(e) = epm::update_metadata_constants(&client) {
|
|
let _ = tx.send(e);
|
|
return;
|
|
}
|
|
prometheus::on_runtime_upgrade();
|
|
log::info!(target: LOG_TARGET, "upgrade to version: {} successful", version);
|
|
},
|
|
Err(e) => {
|
|
log::debug!(target: LOG_TARGET, "upgrade to version: {} failed: {:?}", version, e);
|
|
},
|
|
}
|
|
}
|
|
}
|
|
|
|
#[cfg(test)]
|
|
mod tests {
|
|
use super::*;
|
|
use commands::monitor;
|
|
|
|
#[test]
|
|
fn cli_monitor_works() {
|
|
let opt = Opt::try_parse_from([
|
|
env!("CARGO_PKG_NAME"),
|
|
"--uri",
|
|
"hi",
|
|
"--prometheus-port",
|
|
"9999",
|
|
"monitor",
|
|
"--seed-or-path",
|
|
"//Alice",
|
|
"--listen",
|
|
"head",
|
|
"--delay",
|
|
"12",
|
|
"seq-phragmen",
|
|
]).unwrap();
|
|
|
|
assert_eq!(
|
|
opt,
|
|
Opt {
|
|
uri: "hi".to_string(),
|
|
prometheus_port: 9999,
|
|
log: "info".to_string(),
|
|
command: Command::Monitor(commands::MonitorConfig {
|
|
listen: monitor::Listen::Head,
|
|
solver: opt::Solver::SeqPhragmen { iterations: 10 },
|
|
submission_strategy: monitor::SubmissionStrategy::IfLeading,
|
|
seed_or_path: "//Alice".to_string(),
|
|
delay: 12,
|
|
dry_run: false,
|
|
}),
|
|
}
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn cli_dry_run_works() {
|
|
let opt = Opt::try_parse_from([
|
|
env!("CARGO_PKG_NAME"),
|
|
"--uri",
|
|
"hi",
|
|
"dry-run",
|
|
"9999",
|
|
"--seed-or-path",
|
|
"//Alice",
|
|
"prag-mms",
|
|
]).unwrap();
|
|
|
|
assert_eq!(
|
|
opt,
|
|
Opt {
|
|
uri: "hi".to_string(),
|
|
prometheus_port: 9999,
|
|
log: "info".to_string(),
|
|
command: Command::DryRun(commands::DryRunConfig {
|
|
at: None,
|
|
solver: opt::Solver::PhragMMS { iterations: 10 },
|
|
force_snapshot: false,
|
|
force_winner_count: None,
|
|
seed_or_path: "//Alice".to_string(),
|
|
}),
|
|
}
|
|
);
|
|
}
|
|
|
|
#[test]
|
|
fn cli_dry_run_works() {
|
|
let opt = Opt::try_parse_from([
|
|
env!("CARGO_PKG_NAME"),
|
|
"--uri",
|
|
"hi",
|
|
"emergency-solution",
|
|
"99",
|
|
"prag-mms",
|
|
"--iterations",
|
|
"1337",
|
|
]).unwrap();
|
|
|
|
assert_eq!(
|
|
opt,
|
|
Opt {
|
|
uri: "hi".to_string(),
|
|
prometheus_port: 9999,
|
|
log: "info".to_string(),
|
|
command: Command::EmergencySolution(commands::EmergencySolutionConfig {
|
|
at: None,
|
|
force_winner_count: Some(99),
|
|
solver: opt::Solver::PhragMMS { iterations: 1337 },
|
|
}),
|
|
}
|
|
);
|
|
}
|
|
}
|