mirror of
https://github.com/sigp/lighthouse.git
synced 2026-04-18 21:38:31 +00:00
Merge branch 'stable' into validator-manager
This commit is contained in:
@@ -19,6 +19,7 @@ use self::types::{Error as ResponseError, *};
|
||||
use futures::Stream;
|
||||
use futures_util::StreamExt;
|
||||
use lighthouse_network::PeerId;
|
||||
use pretty_reqwest_error::PrettyReqwestError;
|
||||
pub use reqwest;
|
||||
use reqwest::{IntoUrl, RequestBuilder, Response};
|
||||
pub use reqwest::{StatusCode, Url};
|
||||
@@ -39,7 +40,7 @@ pub const CONSENSUS_VERSION_HEADER: &str = "Eth-Consensus-Version";
|
||||
#[derive(Debug)]
|
||||
pub enum Error {
|
||||
/// The `reqwest` client raised an error.
|
||||
Reqwest(reqwest::Error),
|
||||
HttpClient(PrettyReqwestError),
|
||||
/// The server returned an error message where the body was able to be parsed.
|
||||
ServerMessage(ErrorMessage),
|
||||
/// The server returned an error message with an array of errors.
|
||||
@@ -70,7 +71,7 @@ pub enum Error {
|
||||
|
||||
impl From<reqwest::Error> for Error {
|
||||
fn from(error: reqwest::Error) -> Self {
|
||||
Error::Reqwest(error)
|
||||
Error::HttpClient(error.into())
|
||||
}
|
||||
}
|
||||
|
||||
@@ -78,7 +79,7 @@ impl Error {
|
||||
/// If the error has a HTTP status code, return it.
|
||||
pub fn status(&self) -> Option<StatusCode> {
|
||||
match self {
|
||||
Error::Reqwest(error) => error.status(),
|
||||
Error::HttpClient(error) => error.inner().status(),
|
||||
Error::ServerMessage(msg) => StatusCode::try_from(msg.code).ok(),
|
||||
Error::ServerIndexedMessage(msg) => StatusCode::try_from(msg.code).ok(),
|
||||
Error::StatusCode(status) => Some(*status),
|
||||
@@ -218,7 +219,11 @@ impl BeaconNodeHttpClient {
|
||||
|
||||
/// Perform a HTTP GET request, returning `None` on a 404 error.
|
||||
async fn get_opt<T: DeserializeOwned, U: IntoUrl>(&self, url: U) -> Result<Option<T>, Error> {
|
||||
match self.get_response(url, |b| b).await.optional()? {
|
||||
match self
|
||||
.get_response(url, |b| b.accept(Accept::Json))
|
||||
.await
|
||||
.optional()?
|
||||
{
|
||||
Some(response) => Ok(Some(response.json().await?)),
|
||||
None => Ok(None),
|
||||
}
|
||||
@@ -231,7 +236,7 @@ impl BeaconNodeHttpClient {
|
||||
timeout: Duration,
|
||||
) -> Result<Option<T>, Error> {
|
||||
let opt_response = self
|
||||
.get_response(url, |b| b.timeout(timeout))
|
||||
.get_response(url, |b| b.timeout(timeout).accept(Accept::Json))
|
||||
.await
|
||||
.optional()?;
|
||||
match opt_response {
|
||||
@@ -274,7 +279,7 @@ impl BeaconNodeHttpClient {
|
||||
.await?
|
||||
.json()
|
||||
.await
|
||||
.map_err(Error::Reqwest)
|
||||
.map_err(Into::into)
|
||||
}
|
||||
|
||||
/// Perform a HTTP POST request with a custom timeout.
|
||||
@@ -299,7 +304,7 @@ impl BeaconNodeHttpClient {
|
||||
.await?
|
||||
.json()
|
||||
.await
|
||||
.map_err(Error::Reqwest)
|
||||
.map_err(Error::from)
|
||||
}
|
||||
|
||||
/// Generic POST function supporting arbitrary responses and timeouts.
|
||||
@@ -317,6 +322,26 @@ impl BeaconNodeHttpClient {
|
||||
ok_or_error(response).await
|
||||
}
|
||||
|
||||
/// Generic POST function supporting arbitrary responses and timeouts.
|
||||
async fn post_generic_with_consensus_version<T: Serialize, U: IntoUrl>(
|
||||
&self,
|
||||
url: U,
|
||||
body: &T,
|
||||
timeout: Option<Duration>,
|
||||
fork: ForkName,
|
||||
) -> Result<Response, Error> {
|
||||
let mut builder = self.client.post(url);
|
||||
if let Some(timeout) = timeout {
|
||||
builder = builder.timeout(timeout);
|
||||
}
|
||||
let response = builder
|
||||
.header(CONSENSUS_VERSION_HEADER, fork.to_string())
|
||||
.json(body)
|
||||
.send()
|
||||
.await?;
|
||||
ok_or_error(response).await
|
||||
}
|
||||
|
||||
/// `GET beacon/genesis`
|
||||
///
|
||||
/// ## Errors
|
||||
@@ -649,6 +674,76 @@ impl BeaconNodeHttpClient {
|
||||
Ok(())
|
||||
}
|
||||
|
||||
pub fn post_beacon_blocks_v2_path(
|
||||
&self,
|
||||
validation_level: Option<BroadcastValidation>,
|
||||
) -> Result<Url, Error> {
|
||||
let mut path = self.eth_path(V2)?;
|
||||
path.path_segments_mut()
|
||||
.map_err(|_| Error::InvalidUrl(self.server.clone()))?
|
||||
.extend(&["beacon", "blocks"]);
|
||||
|
||||
path.set_query(
|
||||
validation_level
|
||||
.map(|v| format!("broadcast_validation={}", v))
|
||||
.as_deref(),
|
||||
);
|
||||
|
||||
Ok(path)
|
||||
}
|
||||
|
||||
pub fn post_beacon_blinded_blocks_v2_path(
|
||||
&self,
|
||||
validation_level: Option<BroadcastValidation>,
|
||||
) -> Result<Url, Error> {
|
||||
let mut path = self.eth_path(V2)?;
|
||||
path.path_segments_mut()
|
||||
.map_err(|_| Error::InvalidUrl(self.server.clone()))?
|
||||
.extend(&["beacon", "blinded_blocks"]);
|
||||
|
||||
path.set_query(
|
||||
validation_level
|
||||
.map(|v| format!("broadcast_validation={}", v))
|
||||
.as_deref(),
|
||||
);
|
||||
|
||||
Ok(path)
|
||||
}
|
||||
|
||||
/// `POST v2/beacon/blocks`
|
||||
pub async fn post_beacon_blocks_v2<T: EthSpec, Payload: AbstractExecPayload<T>>(
|
||||
&self,
|
||||
block: &SignedBeaconBlock<T, Payload>,
|
||||
validation_level: Option<BroadcastValidation>,
|
||||
) -> Result<(), Error> {
|
||||
self.post_generic_with_consensus_version(
|
||||
self.post_beacon_blocks_v2_path(validation_level)?,
|
||||
block,
|
||||
Some(self.timeouts.proposal),
|
||||
block.message().body().fork_name(),
|
||||
)
|
||||
.await?;
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
/// `POST v2/beacon/blinded_blocks`
|
||||
pub async fn post_beacon_blinded_blocks_v2<T: EthSpec>(
|
||||
&self,
|
||||
block: &SignedBlindedBeaconBlock<T>,
|
||||
validation_level: Option<BroadcastValidation>,
|
||||
) -> Result<(), Error> {
|
||||
self.post_generic_with_consensus_version(
|
||||
self.post_beacon_blinded_blocks_v2_path(validation_level)?,
|
||||
block,
|
||||
Some(self.timeouts.proposal),
|
||||
block.message().body().fork_name(),
|
||||
)
|
||||
.await?;
|
||||
|
||||
Ok(())
|
||||
}
|
||||
|
||||
/// Path for `v2/beacon/blocks`
|
||||
pub fn get_beacon_blocks_path(&self, block_id: BlockId) -> Result<Url, Error> {
|
||||
let mut path = self.eth_path(V2)?;
|
||||
@@ -982,16 +1077,14 @@ impl BeaconNodeHttpClient {
|
||||
|
||||
/// `GET beacon/deposit_snapshot`
|
||||
pub async fn get_deposit_snapshot(&self) -> Result<Option<types::DepositTreeSnapshot>, Error> {
|
||||
use ssz::Decode;
|
||||
let mut path = self.eth_path(V1)?;
|
||||
path.path_segments_mut()
|
||||
.map_err(|()| Error::InvalidUrl(self.server.clone()))?
|
||||
.push("beacon")
|
||||
.push("deposit_snapshot");
|
||||
self.get_bytes_opt_accept_header(path, Accept::Ssz, self.timeouts.get_deposit_snapshot)
|
||||
.await?
|
||||
.map(|bytes| DepositTreeSnapshot::from_ssz_bytes(&bytes).map_err(Error::InvalidSsz))
|
||||
.transpose()
|
||||
self.get_opt_with_timeout::<GenericResponse<_>, _>(path, self.timeouts.get_deposit_snapshot)
|
||||
.await
|
||||
.map(|opt| opt.map(|r| r.data))
|
||||
}
|
||||
|
||||
/// `POST beacon/rewards/sync_committee`
|
||||
@@ -1643,7 +1736,7 @@ impl BeaconNodeHttpClient {
|
||||
.bytes_stream()
|
||||
.map(|next| match next {
|
||||
Ok(bytes) => EventKind::from_sse_bytes(bytes.as_ref()),
|
||||
Err(e) => Err(Error::Reqwest(e)),
|
||||
Err(e) => Err(Error::HttpClient(e.into())),
|
||||
}))
|
||||
}
|
||||
|
||||
|
||||
@@ -364,12 +364,12 @@ pub struct DatabaseInfo {
|
||||
impl BeaconNodeHttpClient {
|
||||
/// Perform a HTTP GET request, returning `None` on a 404 error.
|
||||
async fn get_bytes_opt<U: IntoUrl>(&self, url: U) -> Result<Option<Vec<u8>>, Error> {
|
||||
let response = self.client.get(url).send().await.map_err(Error::Reqwest)?;
|
||||
let response = self.client.get(url).send().await.map_err(Error::from)?;
|
||||
match ok_or_error(response).await {
|
||||
Ok(resp) => Ok(Some(
|
||||
resp.bytes()
|
||||
.await
|
||||
.map_err(Error::Reqwest)?
|
||||
.map_err(Error::from)?
|
||||
.into_iter()
|
||||
.collect::<Vec<_>>(),
|
||||
)),
|
||||
|
||||
@@ -16,6 +16,7 @@ use std::path::Path;
|
||||
|
||||
pub use reqwest;
|
||||
pub use reqwest::{Response, StatusCode, Url};
|
||||
use types::graffiti::GraffitiString;
|
||||
|
||||
/// A wrapper around `reqwest::Client` which provides convenience methods for interfacing with a
|
||||
/// Lighthouse Validator Client HTTP server (`validator_client/src/http_api`).
|
||||
@@ -169,7 +170,7 @@ impl ValidatorClientHttpClient {
|
||||
.map_err(|_| Error::InvalidSignatureHeader)?
|
||||
.to_string();
|
||||
|
||||
let body = response.bytes().await.map_err(Error::Reqwest)?;
|
||||
let body = response.bytes().await.map_err(Error::from)?;
|
||||
|
||||
let message =
|
||||
Message::parse_slice(digest(&SHA256, &body).as_ref()).expect("sha256 is 32 bytes");
|
||||
@@ -221,7 +222,7 @@ impl ValidatorClientHttpClient {
|
||||
.headers(self.headers()?)
|
||||
.send()
|
||||
.await
|
||||
.map_err(Error::Reqwest)?;
|
||||
.map_err(Error::from)?;
|
||||
ok_or_error(response).await
|
||||
}
|
||||
|
||||
@@ -235,7 +236,7 @@ impl ValidatorClientHttpClient {
|
||||
.await?
|
||||
.json()
|
||||
.await
|
||||
.map_err(Error::Reqwest)
|
||||
.map_err(Error::from)
|
||||
}
|
||||
|
||||
/// Perform a HTTP GET request, returning `None` on a 404 error.
|
||||
@@ -265,7 +266,7 @@ impl ValidatorClientHttpClient {
|
||||
.json(body)
|
||||
.send()
|
||||
.await
|
||||
.map_err(Error::Reqwest)?;
|
||||
.map_err(Error::from)?;
|
||||
ok_or_error(response).await
|
||||
}
|
||||
|
||||
@@ -296,7 +297,7 @@ impl ValidatorClientHttpClient {
|
||||
.json(body)
|
||||
.send()
|
||||
.await
|
||||
.map_err(Error::Reqwest)?;
|
||||
.map_err(Error::from)?;
|
||||
let response = ok_or_error(response).await?;
|
||||
self.signed_body(response).await?;
|
||||
Ok(())
|
||||
@@ -315,7 +316,7 @@ impl ValidatorClientHttpClient {
|
||||
.json(body)
|
||||
.send()
|
||||
.await
|
||||
.map_err(Error::Reqwest)?;
|
||||
.map_err(Error::from)?;
|
||||
ok_or_error(response).await
|
||||
}
|
||||
|
||||
@@ -467,6 +468,7 @@ impl ValidatorClientHttpClient {
|
||||
enabled: Option<bool>,
|
||||
gas_limit: Option<u64>,
|
||||
builder_proposals: Option<bool>,
|
||||
graffiti: Option<GraffitiString>,
|
||||
) -> Result<(), Error> {
|
||||
let mut path = self.server.full.clone();
|
||||
|
||||
@@ -482,6 +484,7 @@ impl ValidatorClientHttpClient {
|
||||
enabled,
|
||||
gas_limit,
|
||||
builder_proposals,
|
||||
graffiti,
|
||||
},
|
||||
)
|
||||
.await
|
||||
|
||||
@@ -83,6 +83,9 @@ pub struct ValidatorPatchRequest {
|
||||
#[serde(default)]
|
||||
#[serde(skip_serializing_if = "Option::is_none")]
|
||||
pub builder_proposals: Option<bool>,
|
||||
#[serde(default)]
|
||||
#[serde(skip_serializing_if = "Option::is_none")]
|
||||
pub graffiti: Option<GraffitiString>,
|
||||
}
|
||||
|
||||
#[derive(Clone, PartialEq, Serialize, Deserialize)]
|
||||
|
||||
@@ -3,11 +3,10 @@
|
||||
|
||||
use crate::Error as ServerError;
|
||||
use lighthouse_network::{ConnectionDirection, Enr, Multiaddr, PeerConnectionStatus};
|
||||
use mime::{Mime, APPLICATION, JSON, OCTET_STREAM, STAR};
|
||||
use mediatype::{names, MediaType, MediaTypeList};
|
||||
use serde::{Deserialize, Serialize};
|
||||
use std::cmp::Reverse;
|
||||
use std::convert::TryFrom;
|
||||
use std::fmt;
|
||||
use std::fmt::{self, Display};
|
||||
use std::str::{from_utf8, FromStr};
|
||||
use std::time::Duration;
|
||||
pub use types::*;
|
||||
@@ -577,6 +576,7 @@ pub struct VersionData {
|
||||
pub struct SyncingData {
|
||||
pub is_syncing: bool,
|
||||
pub is_optimistic: Option<bool>,
|
||||
pub el_offline: Option<bool>,
|
||||
pub head_slot: Slot,
|
||||
pub sync_distance: Slot,
|
||||
}
|
||||
@@ -1171,35 +1171,58 @@ impl FromStr for Accept {
|
||||
type Err = String;
|
||||
|
||||
fn from_str(s: &str) -> Result<Self, Self::Err> {
|
||||
let mut mimes = parse_accept(s)?;
|
||||
let media_type_list = MediaTypeList::new(s);
|
||||
|
||||
// [q-factor weighting]: https://datatracker.ietf.org/doc/html/rfc7231#section-5.3.2
|
||||
// find the highest q-factor supported accept type
|
||||
mimes.sort_by_key(|m| {
|
||||
Reverse(m.get_param("q").map_or(1000_u16, |n| {
|
||||
(n.as_ref().parse::<f32>().unwrap_or(0_f32) * 1000_f32) as u16
|
||||
}))
|
||||
});
|
||||
mimes
|
||||
.into_iter()
|
||||
.find_map(|m| match (m.type_(), m.subtype()) {
|
||||
(APPLICATION, OCTET_STREAM) => Some(Accept::Ssz),
|
||||
(APPLICATION, JSON) => Some(Accept::Json),
|
||||
(STAR, STAR) => Some(Accept::Any),
|
||||
_ => None,
|
||||
})
|
||||
.ok_or_else(|| "accept header is not supported".to_string())
|
||||
}
|
||||
}
|
||||
let mut highest_q = 0_u16;
|
||||
let mut accept_type = None;
|
||||
|
||||
fn parse_accept(accept: &str) -> Result<Vec<Mime>, String> {
|
||||
accept
|
||||
.split(',')
|
||||
.map(|part| {
|
||||
part.parse()
|
||||
.map_err(|e| format!("error parsing Accept header: {}", e))
|
||||
})
|
||||
.collect()
|
||||
const APPLICATION: &str = names::APPLICATION.as_str();
|
||||
const OCTET_STREAM: &str = names::OCTET_STREAM.as_str();
|
||||
const JSON: &str = names::JSON.as_str();
|
||||
const STAR: &str = names::_STAR.as_str();
|
||||
const Q: &str = names::Q.as_str();
|
||||
|
||||
media_type_list.into_iter().for_each(|item| {
|
||||
if let Ok(MediaType {
|
||||
ty,
|
||||
subty,
|
||||
suffix: _,
|
||||
params,
|
||||
}) = item
|
||||
{
|
||||
let q_accept = match (ty.as_str(), subty.as_str()) {
|
||||
(APPLICATION, OCTET_STREAM) => Some(Accept::Ssz),
|
||||
(APPLICATION, JSON) => Some(Accept::Json),
|
||||
(STAR, STAR) => Some(Accept::Any),
|
||||
_ => None,
|
||||
}
|
||||
.map(|item_accept_type| {
|
||||
let q_val = params
|
||||
.iter()
|
||||
.find_map(|(n, v)| match n.as_str() {
|
||||
Q => {
|
||||
Some((v.as_str().parse::<f32>().unwrap_or(0_f32) * 1000_f32) as u16)
|
||||
}
|
||||
_ => None,
|
||||
})
|
||||
.or(Some(1000_u16));
|
||||
|
||||
(q_val.unwrap(), item_accept_type)
|
||||
});
|
||||
|
||||
match q_accept {
|
||||
Some((q, accept)) if q > highest_q => {
|
||||
highest_q = q;
|
||||
accept_type = Some(accept);
|
||||
}
|
||||
_ => (),
|
||||
}
|
||||
}
|
||||
});
|
||||
accept_type.ok_or_else(|| "accept header is not supported".to_string())
|
||||
}
|
||||
}
|
||||
|
||||
#[derive(Debug, Serialize, Deserialize)]
|
||||
@@ -1237,6 +1260,50 @@ pub struct ForkChoiceNode {
|
||||
pub execution_block_hash: Option<Hash256>,
|
||||
}
|
||||
|
||||
#[derive(Copy, Clone, Debug, Serialize, Deserialize, PartialEq, Eq)]
|
||||
#[serde(rename_all = "snake_case")]
|
||||
pub enum BroadcastValidation {
|
||||
Gossip,
|
||||
Consensus,
|
||||
ConsensusAndEquivocation,
|
||||
}
|
||||
|
||||
impl Default for BroadcastValidation {
|
||||
fn default() -> Self {
|
||||
Self::Gossip
|
||||
}
|
||||
}
|
||||
|
||||
impl Display for BroadcastValidation {
|
||||
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
||||
match self {
|
||||
Self::Gossip => write!(f, "gossip"),
|
||||
Self::Consensus => write!(f, "consensus"),
|
||||
Self::ConsensusAndEquivocation => write!(f, "consensus_and_equivocation"),
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
impl FromStr for BroadcastValidation {
|
||||
type Err = &'static str;
|
||||
|
||||
fn from_str(s: &str) -> Result<Self, Self::Err> {
|
||||
match s {
|
||||
"gossip" => Ok(Self::Gossip),
|
||||
"consensus" => Ok(Self::Consensus),
|
||||
"consensus_and_equivocation" => Ok(Self::ConsensusAndEquivocation),
|
||||
_ => Err("Invalid broadcast validation level"),
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
#[derive(Default, Deserialize, Serialize)]
|
||||
#[serde(rename_all = "snake_case")]
|
||||
pub struct BroadcastValidationQuery {
|
||||
#[serde(default)]
|
||||
pub broadcast_validation: BroadcastValidation,
|
||||
}
|
||||
|
||||
#[cfg(test)]
|
||||
mod tests {
|
||||
use super::*;
|
||||
@@ -1267,6 +1334,11 @@ mod tests {
|
||||
assert_eq!(
|
||||
Accept::from_str("text/plain"),
|
||||
Err("accept header is not supported".to_string())
|
||||
)
|
||||
);
|
||||
|
||||
assert_eq!(
|
||||
Accept::from_str("application/json;message=\"Hello, world!\";q=0.3,*/*;q=0.6").unwrap(),
|
||||
Accept::Any
|
||||
);
|
||||
}
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user