mirror of
https://github.com/sigp/lighthouse.git
synced 2026-03-16 03:12:41 +00:00
Rework Validator Client fallback mechanism
This commit is contained in:
@@ -1,5 +1,6 @@
|
||||
use crate::local_network::LocalNetwork;
|
||||
use node_test_rig::eth2::types::{BlockId, StateId};
|
||||
|
||||
use std::time::Duration;
|
||||
use types::{Epoch, EthSpec, ExecPayload, ExecutionBlockHash, Hash256, Slot, Unsigned};
|
||||
|
||||
@@ -243,3 +244,67 @@ pub async fn verify_transition_block_finalized<E: EthSpec>(
|
||||
))
|
||||
}
|
||||
}
|
||||
|
||||
pub async fn disconnect_from_execution_layer<E: EthSpec>(
|
||||
network: LocalNetwork<E>,
|
||||
transition_epoch: Epoch,
|
||||
slot_duration: Duration,
|
||||
) -> Result<(), String> {
|
||||
epoch_delay(transition_epoch + 1, slot_duration, E::slots_per_epoch()).await;
|
||||
|
||||
eprintln!("Disabling Execution Layer");
|
||||
|
||||
// Take the execution node at position 0 and force it to return the `syncing` status.
|
||||
network.execution_nodes.read()[0]
|
||||
.server
|
||||
.all_payloads_syncing(false);
|
||||
|
||||
// Run for 2 epochs with the 0th execution node stalled.
|
||||
epoch_delay(
|
||||
transition_epoch + 1 + 2,
|
||||
slot_duration,
|
||||
E::slots_per_epoch(),
|
||||
)
|
||||
.await;
|
||||
|
||||
// Restore the functionality of the 0th execution node.
|
||||
network.execution_nodes.read()[0]
|
||||
.server
|
||||
.all_payloads_valid();
|
||||
|
||||
eprintln!("Re-enabling Execution Layer");
|
||||
Ok(())
|
||||
}
|
||||
|
||||
/// Ensure all validators have attested correctly.
|
||||
pub async fn check_attestation_correctness<E: EthSpec>(
|
||||
network: LocalNetwork<E>,
|
||||
upto_epoch: Epoch,
|
||||
slots_per_epoch: u64,
|
||||
slot_duration: Duration,
|
||||
) -> Result<(), String> {
|
||||
let upto_slot = upto_epoch.start_slot(slots_per_epoch);
|
||||
slot_delay(upto_slot, slot_duration).await;
|
||||
|
||||
let remote_node = &network.remote_nodes()?[1];
|
||||
|
||||
let results = remote_node
|
||||
.get_lighthouse_analysis_attestation_performance(
|
||||
Epoch::new(2),
|
||||
upto_epoch - 2,
|
||||
"global".to_string(),
|
||||
)
|
||||
.await
|
||||
.map_err(|e| format!("Unable to get attestation performance: {e}"))?;
|
||||
|
||||
for result in results {
|
||||
for epochs in result.epochs.values() {
|
||||
assert!(epochs.active);
|
||||
assert!(epochs.head);
|
||||
assert!(epochs.target);
|
||||
assert!(epochs.source);
|
||||
}
|
||||
}
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
@@ -119,7 +119,45 @@ pub fn cli_app<'a, 'b>() -> App<'a, 'b> {
|
||||
.takes_value(true)
|
||||
.default_value("all")
|
||||
.possible_values(&["one-node", "two-nodes", "mixed", "all"])
|
||||
.help("Sync verification strategy to run."),
|
||||
.help("Sync verification strategy to run."))
|
||||
)
|
||||
.subcommand(
|
||||
SubCommand::with_name("fallback-sim")
|
||||
.about("Run the fallback simulation")
|
||||
.arg(Arg::with_name("vc_count")
|
||||
.short("c")
|
||||
.long("vc-count")
|
||||
.takes_value(true)
|
||||
.default_value("4")
|
||||
.help("Number of validator clients"))
|
||||
.arg(Arg::with_name("bns_per_vc")
|
||||
.short("b")
|
||||
.long("bns_per_vc")
|
||||
.takes_value(true)
|
||||
.default_value("2")
|
||||
.help("Number of beacon nodes to connect to each validator client"))
|
||||
.arg(Arg::with_name("validators_per_vc")
|
||||
.short("v")
|
||||
.long("validators_per_vc")
|
||||
.takes_value(true)
|
||||
.default_value("20")
|
||||
.help("Number of validators per client"))
|
||||
.arg(Arg::with_name("speed_up_factor")
|
||||
.short("s")
|
||||
.long("speed_up_factor")
|
||||
.takes_value(true)
|
||||
.default_value("3")
|
||||
.help("Speed up factor. Please use a divisor of 12."))
|
||||
.arg(Arg::with_name("post-merge")
|
||||
.short("m")
|
||||
.long("post-merge")
|
||||
.takes_value(false)
|
||||
.help("Simulate the merge transition"))
|
||||
.arg(Arg::with_name("continue_after_checks")
|
||||
.short("c")
|
||||
.long("continue_after_checks")
|
||||
.takes_value(false)
|
||||
.help("Continue after checks (default false)")
|
||||
),
|
||||
)
|
||||
}
|
||||
|
||||
@@ -64,7 +64,7 @@ pub fn run_eth1_sim(matches: &ArgMatches) -> Result<(), String> {
|
||||
let mut env = EnvironmentBuilder::minimal()
|
||||
.initialize_logger(LoggerConfig {
|
||||
path: None,
|
||||
debug_level: String::from("debug"),
|
||||
debug_level: String::from("info"),
|
||||
logfile_debug_level: String::from("debug"),
|
||||
log_format: None,
|
||||
logfile_format: None,
|
||||
|
||||
333
testing/simulator/src/fallback_sim.rs
Normal file
333
testing/simulator/src/fallback_sim.rs
Normal file
@@ -0,0 +1,333 @@
|
||||
use futures::prelude::*;
|
||||
|
||||
use std::cmp::max;
|
||||
use std::net::Ipv4Addr;
|
||||
use std::time::Duration;
|
||||
|
||||
use crate::local_network::{EXECUTION_PORT, TERMINAL_BLOCK, TERMINAL_DIFFICULTY};
|
||||
use crate::{checks, LocalNetwork, E};
|
||||
use clap::ArgMatches;
|
||||
use eth1::{Eth1Endpoint, DEFAULT_CHAIN_ID};
|
||||
use eth1_test_rig::AnvilEth1Instance;
|
||||
|
||||
use execution_layer::http::deposit_methods::Eth1Id;
|
||||
|
||||
use node_test_rig::{
|
||||
environment::{EnvironmentBuilder, LoggerConfig},
|
||||
testing_client_config, testing_validator_config, ClientGenesis, ValidatorFiles,
|
||||
};
|
||||
use rayon::prelude::*;
|
||||
use sensitive_url::SensitiveUrl;
|
||||
use tokio::time::sleep;
|
||||
use types::{Epoch, EthSpec, MinimalEthSpec};
|
||||
|
||||
const END_EPOCH: u64 = 20;
|
||||
const ALTAIR_FORK_EPOCH: u64 = 1;
|
||||
const BELLATRIX_FORK_EPOCH: u64 = 2;
|
||||
|
||||
const SUGGESTED_FEE_RECIPIENT: [u8; 20] =
|
||||
[0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1];
|
||||
|
||||
pub fn run_fallback_sim(matches: &ArgMatches) -> Result<(), String> {
|
||||
let speed_up_factor =
|
||||
value_t!(matches, "speed_up_factor", u64).expect("missing speed_up_factor default");
|
||||
let vc_count = value_t!(matches, "vc_count", usize).expect("missing vc_count default");
|
||||
let validators_per_vc =
|
||||
value_t!(matches, "validators_per_vc", usize).expect("missing validators_per_vc default");
|
||||
let bns_per_vc = value_t!(matches, "bns_per_vc", usize).expect("missing bns_per_vc default");
|
||||
let continue_after_checks = matches.is_present("continue_after_checks");
|
||||
//let post_merge_sim = matches.is_present("post-merge");
|
||||
let post_merge_sim = true;
|
||||
|
||||
println!("Fallback Simulator:");
|
||||
println!(" Validator Clients: {}", vc_count);
|
||||
println!(" Validators per Client: {}", validators_per_vc);
|
||||
println!(" Beacon Nodes per Validator Client: {}", bns_per_vc);
|
||||
println!(" speed up factor:{}", speed_up_factor);
|
||||
|
||||
let log_level = "debug";
|
||||
|
||||
fallback_sim(
|
||||
speed_up_factor,
|
||||
vc_count,
|
||||
validators_per_vc,
|
||||
bns_per_vc,
|
||||
post_merge_sim,
|
||||
continue_after_checks,
|
||||
log_level,
|
||||
)
|
||||
}
|
||||
|
||||
fn fallback_sim(
|
||||
speed_up_factor: u64,
|
||||
vc_count: usize,
|
||||
validators_per_vc: usize,
|
||||
bns_per_vc: usize,
|
||||
post_merge_sim: bool,
|
||||
continue_after_checks: bool,
|
||||
log_level: &str,
|
||||
) -> Result<(), String> {
|
||||
// Generate the directories and keystores required for the validator clients.
|
||||
let validator_files = (0..vc_count)
|
||||
.into_par_iter()
|
||||
.map(|i| {
|
||||
println!(
|
||||
"Generating keystores for validator {} of {}",
|
||||
i + 1,
|
||||
vc_count
|
||||
);
|
||||
|
||||
let indices = (i * validators_per_vc..(i + 1) * validators_per_vc).collect::<Vec<_>>();
|
||||
ValidatorFiles::with_keystores(&indices).unwrap()
|
||||
})
|
||||
.collect::<Vec<_>>();
|
||||
|
||||
let mut env = EnvironmentBuilder::minimal()
|
||||
.initialize_logger(LoggerConfig {
|
||||
path: None,
|
||||
debug_level: String::from(log_level),
|
||||
logfile_debug_level: String::from("debug"),
|
||||
log_format: None,
|
||||
logfile_format: None,
|
||||
log_color: false,
|
||||
disable_log_timestamp: false,
|
||||
max_log_size: 0,
|
||||
max_log_number: 0,
|
||||
compression: false,
|
||||
is_restricted: true,
|
||||
sse_logging: false,
|
||||
})?
|
||||
.multi_threaded_tokio_runtime()?
|
||||
.build()?;
|
||||
|
||||
let eth1_block_time = Duration::from_millis(15_000 / speed_up_factor);
|
||||
|
||||
let spec = &mut env.eth2_config.spec;
|
||||
|
||||
let total_validator_count = validators_per_vc * vc_count;
|
||||
let node_count = vc_count * bns_per_vc;
|
||||
//let altair_fork_version = spec.altair_fork_version;
|
||||
//let bellatrix_fork_version = spec.bellatrix_fork_version;
|
||||
|
||||
spec.seconds_per_slot /= speed_up_factor;
|
||||
spec.seconds_per_slot = max(1, spec.seconds_per_slot);
|
||||
spec.eth1_follow_distance = 16;
|
||||
spec.genesis_delay = eth1_block_time.as_secs() * spec.eth1_follow_distance * 2;
|
||||
spec.min_genesis_time = 0;
|
||||
spec.min_genesis_active_validator_count = total_validator_count as u64;
|
||||
spec.seconds_per_eth1_block = eth1_block_time.as_secs();
|
||||
spec.altair_fork_epoch = Some(Epoch::new(ALTAIR_FORK_EPOCH));
|
||||
// Set these parameters only if we are doing a merge simulation
|
||||
if post_merge_sim {
|
||||
spec.terminal_total_difficulty = TERMINAL_DIFFICULTY.into();
|
||||
spec.bellatrix_fork_epoch = Some(Epoch::new(BELLATRIX_FORK_EPOCH));
|
||||
}
|
||||
|
||||
let seconds_per_slot = spec.seconds_per_slot;
|
||||
let slot_duration = Duration::from_secs(spec.seconds_per_slot);
|
||||
let _initial_validator_count = spec.min_genesis_active_validator_count as usize;
|
||||
let deposit_amount = env.eth2_config.spec.max_effective_balance;
|
||||
|
||||
let context = env.core_context();
|
||||
|
||||
let main_future = async {
|
||||
/*
|
||||
* Deploy the deposit contract, spawn tasks to keep creating new blocks and deposit
|
||||
* validators.
|
||||
*/
|
||||
let anvil_eth1_instance = AnvilEth1Instance::new(DEFAULT_CHAIN_ID.into()).await?;
|
||||
let deposit_contract = anvil_eth1_instance.deposit_contract;
|
||||
let chain_id = anvil_eth1_instance.anvil.chain_id();
|
||||
let anvil = anvil_eth1_instance.anvil;
|
||||
let eth1_endpoint = SensitiveUrl::parse(anvil.endpoint().as_str())
|
||||
.expect("Unable to parse anvil endpoint.");
|
||||
let deposit_contract_address = deposit_contract.address();
|
||||
|
||||
// Start a timer that produces eth1 blocks on an interval.
|
||||
tokio::spawn(async move {
|
||||
let mut interval = tokio::time::interval(eth1_block_time);
|
||||
loop {
|
||||
interval.tick().await;
|
||||
let _ = anvil.evm_mine().await;
|
||||
}
|
||||
});
|
||||
|
||||
// Submit deposits to the deposit contract.
|
||||
tokio::spawn(async move {
|
||||
for i in 0..total_validator_count {
|
||||
println!("Submitting deposit for validator {}...", i);
|
||||
let _ = deposit_contract
|
||||
.deposit_deterministic_async::<E>(i, deposit_amount)
|
||||
.await;
|
||||
}
|
||||
});
|
||||
|
||||
let mut beacon_config = testing_client_config();
|
||||
|
||||
beacon_config.genesis = ClientGenesis::DepositContract;
|
||||
beacon_config.eth1.endpoint = Eth1Endpoint::NoAuth(eth1_endpoint);
|
||||
beacon_config.eth1.deposit_contract_address = deposit_contract_address;
|
||||
beacon_config.eth1.deposit_contract_deploy_block = 0;
|
||||
beacon_config.eth1.lowest_cached_block_number = 0;
|
||||
beacon_config.eth1.follow_distance = 1;
|
||||
beacon_config.eth1.node_far_behind_seconds = 20;
|
||||
beacon_config.dummy_eth1_backend = false;
|
||||
beacon_config.sync_eth1_chain = true;
|
||||
beacon_config.eth1.auto_update_interval_millis = eth1_block_time.as_millis() as u64;
|
||||
beacon_config.eth1.chain_id = Eth1Id::from(chain_id);
|
||||
beacon_config.network.target_peers = node_count - 1;
|
||||
|
||||
beacon_config.network.enr_address = (Some(Ipv4Addr::LOCALHOST), None);
|
||||
|
||||
if post_merge_sim {
|
||||
let el_config = execution_layer::Config {
|
||||
execution_endpoints: vec![SensitiveUrl::parse(&format!(
|
||||
"http://localhost:{}",
|
||||
EXECUTION_PORT
|
||||
))
|
||||
.unwrap()],
|
||||
..Default::default()
|
||||
};
|
||||
|
||||
beacon_config.execution_layer = Some(el_config);
|
||||
}
|
||||
|
||||
/*
|
||||
* Create a new `LocalNetwork` with one beacon node.
|
||||
*/
|
||||
let network = LocalNetwork::new(context.clone(), beacon_config.clone()).await?;
|
||||
|
||||
/*
|
||||
* One by one, add beacon nodes to the network.
|
||||
*/
|
||||
for _ in 0..node_count - 1 {
|
||||
network
|
||||
.add_beacon_node(beacon_config.clone(), false)
|
||||
.await?;
|
||||
}
|
||||
|
||||
/*
|
||||
* One by one, add validators to the network.
|
||||
*/
|
||||
let executor = context.executor.clone();
|
||||
for (i, files) in validator_files.into_iter().enumerate() {
|
||||
let network_1 = network.clone();
|
||||
let beacon_nodes = if i == vc_count {
|
||||
vec![i, 0]
|
||||
} else {
|
||||
vec![i, i + 1]
|
||||
};
|
||||
executor.spawn(
|
||||
async move {
|
||||
let mut validator_config = testing_validator_config();
|
||||
if post_merge_sim {
|
||||
validator_config.fee_recipient = Some(SUGGESTED_FEE_RECIPIENT.into());
|
||||
}
|
||||
println!("Adding validator client {}", i);
|
||||
network_1
|
||||
.add_validator_client_with_fallbacks(
|
||||
validator_config,
|
||||
i,
|
||||
beacon_nodes,
|
||||
files,
|
||||
)
|
||||
.await
|
||||
.expect("should add validator");
|
||||
},
|
||||
"vc",
|
||||
);
|
||||
}
|
||||
|
||||
let duration_to_genesis = network.duration_to_genesis().await;
|
||||
println!("Duration to genesis: {}", duration_to_genesis.as_secs());
|
||||
sleep(duration_to_genesis).await;
|
||||
|
||||
if post_merge_sim {
|
||||
let executor = executor.clone();
|
||||
let network_2 = network.clone();
|
||||
executor.spawn(
|
||||
async move {
|
||||
println!("Mining pow blocks");
|
||||
let mut interval = tokio::time::interval(Duration::from_secs(seconds_per_slot));
|
||||
for i in 1..=TERMINAL_BLOCK + 1 {
|
||||
interval.tick().await;
|
||||
let _ = network_2.mine_pow_blocks(i);
|
||||
}
|
||||
},
|
||||
"pow_mining",
|
||||
);
|
||||
}
|
||||
/*
|
||||
* Start the checks that ensure the network performs as expected.
|
||||
*
|
||||
* We start these checks immediately after the validators have started. This means we're
|
||||
* relying on the validator futures to all return immediately after genesis so that these
|
||||
* tests start at the right time. Whilst this is works well for now, it's subject to
|
||||
* breakage by changes to the VC.
|
||||
*/
|
||||
|
||||
let (
|
||||
//finalization,
|
||||
//block_prod,
|
||||
//validator_count,
|
||||
//onboarding,
|
||||
fallback,
|
||||
check_attestations,
|
||||
//fork,
|
||||
//sync_aggregate,
|
||||
//transition,
|
||||
) = futures::join!(
|
||||
//checks::verify_first_finalization(network.clone(), slot_duration),
|
||||
checks::disconnect_from_execution_layer(
|
||||
network.clone(),
|
||||
Epoch::new(BELLATRIX_FORK_EPOCH),
|
||||
slot_duration
|
||||
),
|
||||
checks::check_attestation_correctness(
|
||||
network.clone(),
|
||||
Epoch::new(END_EPOCH),
|
||||
MinimalEthSpec::slots_per_epoch(),
|
||||
slot_duration
|
||||
),
|
||||
//checks::stall_node(network.clone(), 0, 30, seconds_per_slot),
|
||||
);
|
||||
|
||||
//block_prod?;
|
||||
//finalization?;
|
||||
//validator_count?;
|
||||
//onboarding?;
|
||||
fallback?;
|
||||
check_attestations?;
|
||||
//fork?;
|
||||
//sync_aggregate?;
|
||||
//transition?;
|
||||
|
||||
// The `final_future` either completes immediately or never completes, depending on the value
|
||||
// of `continue_after_checks`.
|
||||
|
||||
if continue_after_checks {
|
||||
future::pending::<()>().await;
|
||||
}
|
||||
/*
|
||||
* End the simulation by dropping the network. This will kill all running beacon nodes and
|
||||
* validator clients.
|
||||
*/
|
||||
println!(
|
||||
"Simulation complete. Finished with {} beacon nodes and {} validator clients",
|
||||
network.beacon_node_count(),
|
||||
network.validator_client_count()
|
||||
);
|
||||
|
||||
// Be explicit about dropping the network, as this kills all the nodes. This ensures
|
||||
// all the checks have adequate time to pass.
|
||||
drop(network);
|
||||
Ok::<(), String>(())
|
||||
};
|
||||
|
||||
env.runtime().block_on(main_future).unwrap();
|
||||
|
||||
env.fire_signal();
|
||||
env.shutdown_on_idle();
|
||||
|
||||
Ok(())
|
||||
}
|
||||
@@ -265,6 +265,48 @@ impl<E: EthSpec> LocalNetwork<E> {
|
||||
Ok(())
|
||||
}
|
||||
|
||||
pub async fn add_validator_client_with_fallbacks(
|
||||
&self,
|
||||
mut validator_config: ValidatorConfig,
|
||||
validator_index: usize,
|
||||
beacon_nodes: Vec<usize>,
|
||||
validator_files: ValidatorFiles,
|
||||
) -> Result<(), String> {
|
||||
let context = self
|
||||
.context
|
||||
.service_context(format!("validator_{}", validator_index));
|
||||
let self_1 = self.clone();
|
||||
let mut beacon_node_urls = vec![];
|
||||
for beacon_node in beacon_nodes {
|
||||
let socket_addr = {
|
||||
let read_lock = self.beacon_nodes.read();
|
||||
let beacon_node = read_lock
|
||||
.get(beacon_node)
|
||||
.ok_or_else(|| format!("No beacon node for index {}", beacon_node))?;
|
||||
beacon_node
|
||||
.client
|
||||
.http_api_listen_addr()
|
||||
.expect("Must have http started")
|
||||
};
|
||||
let beacon_node = SensitiveUrl::parse(
|
||||
format!("http://{}:{}", socket_addr.ip(), socket_addr.port()).as_str(),
|
||||
)
|
||||
.unwrap();
|
||||
beacon_node_urls.push(beacon_node);
|
||||
}
|
||||
|
||||
validator_config.beacon_nodes = beacon_node_urls;
|
||||
|
||||
let validator_client = LocalValidatorClient::production_with_insecure_keypairs(
|
||||
context,
|
||||
validator_config,
|
||||
validator_files,
|
||||
)
|
||||
.await?;
|
||||
self_1.validator_clients.write().push(validator_client);
|
||||
Ok(())
|
||||
}
|
||||
|
||||
/// For all beacon nodes in `Self`, return a HTTP client to access each nodes HTTP API.
|
||||
pub fn remote_nodes(&self) -> Result<Vec<BeaconNodeHttpClient>, String> {
|
||||
let beacon_nodes = self.beacon_nodes.read();
|
||||
|
||||
@@ -19,6 +19,7 @@ extern crate clap;
|
||||
mod checks;
|
||||
mod cli;
|
||||
mod eth1_sim;
|
||||
mod fallback_sim;
|
||||
mod local_network;
|
||||
mod no_eth1_sim;
|
||||
mod retry;
|
||||
@@ -58,6 +59,13 @@ fn main() {
|
||||
std::process::exit(1)
|
||||
}
|
||||
},
|
||||
("fallback-sim", Some(matches)) => match fallback_sim::run_fallback_sim(matches) {
|
||||
Ok(()) => println!("Simulation exited successfully"),
|
||||
Err(e) => {
|
||||
eprintln!("Simulation exited with an error: {}", e);
|
||||
std::process::exit(1)
|
||||
}
|
||||
},
|
||||
_ => {
|
||||
eprintln!("Invalid subcommand. Use --help to see available options");
|
||||
std::process::exit(1)
|
||||
|
||||
Reference in New Issue
Block a user