mirror of
https://github.com/sigp/lighthouse.git
synced 2026-03-09 03:31:45 +00:00
This PR relates to: - https://github.com/sigp/lighthouse/pull/7199 - -> workspace_filter has been enabled (dependency logging has been disabled) - https://github.com/sigp/lighthouse/pull/7394 - -> file logging has been optionally enabled Building on these, this PR enables dependency logging for the simulators. The logs are written to separate files. The libp2p/discv5 logs: - are saved to the directory specified with `--log-dir` - respects the `RUST_LOG` environment variable for log level configuration
417 lines
15 KiB
Rust
417 lines
15 KiB
Rust
use crate::local_network::LocalNetworkParams;
|
|
use crate::local_network::TERMINAL_BLOCK;
|
|
use crate::{checks, LocalNetwork};
|
|
use clap::ArgMatches;
|
|
|
|
use crate::retry::with_retry;
|
|
use futures::prelude::*;
|
|
use node_test_rig::{
|
|
environment::{EnvironmentBuilder, LoggerConfig},
|
|
testing_validator_config, ApiTopic, ValidatorFiles,
|
|
};
|
|
use rayon::prelude::*;
|
|
use std::cmp::max;
|
|
use std::path::PathBuf;
|
|
use std::sync::Arc;
|
|
use std::time::Duration;
|
|
|
|
use environment::tracing_common;
|
|
use tracing_subscriber::prelude::*;
|
|
use tracing_subscriber::{layer::SubscriberExt, util::SubscriberInitExt, EnvFilter};
|
|
|
|
use logging::build_workspace_filter;
|
|
use tokio::time::sleep;
|
|
use tracing::Level;
|
|
use types::{Epoch, EthSpec, MinimalEthSpec};
|
|
|
|
const END_EPOCH: u64 = 16;
|
|
const GENESIS_DELAY: u64 = 32;
|
|
const ALTAIR_FORK_EPOCH: u64 = 0;
|
|
const BELLATRIX_FORK_EPOCH: u64 = 0;
|
|
const CAPELLA_FORK_EPOCH: u64 = 0;
|
|
const DENEB_FORK_EPOCH: u64 = 0;
|
|
const ELECTRA_FORK_EPOCH: u64 = 2;
|
|
|
|
const SUGGESTED_FEE_RECIPIENT: [u8; 20] =
|
|
[0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1];
|
|
|
|
#[allow(clippy::large_stack_frames)]
|
|
pub fn run_basic_sim(matches: &ArgMatches) -> Result<(), String> {
|
|
let (_name, subcommand_matches) = matches.subcommand().expect("subcommand");
|
|
let node_count = subcommand_matches
|
|
.get_one::<String>("nodes")
|
|
.expect("missing nodes default")
|
|
.parse::<usize>()
|
|
.expect("missing nodes default");
|
|
let proposer_nodes = subcommand_matches
|
|
.get_one::<String>("proposer-nodes")
|
|
.unwrap_or(&String::from("0"))
|
|
.parse::<usize>()
|
|
.unwrap_or(0);
|
|
// extra beacon node added with delay
|
|
let extra_nodes: usize = 1;
|
|
println!("PROPOSER-NODES: {}", proposer_nodes);
|
|
let validators_per_node = subcommand_matches
|
|
.get_one::<String>("validators-per-node")
|
|
.expect("missing validators-per-node default")
|
|
.parse::<usize>()
|
|
.expect("missing validators-per-node default");
|
|
let speed_up_factor = subcommand_matches
|
|
.get_one::<String>("speed-up-factor")
|
|
.expect("missing speed-up-factor default")
|
|
.parse::<u64>()
|
|
.expect("missing speed-up-factor default");
|
|
let log_level = subcommand_matches
|
|
.get_one::<String>("debug-level")
|
|
.expect("missing debug-level");
|
|
|
|
let continue_after_checks = subcommand_matches.get_flag("continue-after-checks");
|
|
let log_dir = subcommand_matches
|
|
.get_one::<String>("log-dir")
|
|
.map(PathBuf::from);
|
|
let disable_stdout_logging = subcommand_matches.get_flag("disable-stdout-logging");
|
|
|
|
println!("Basic Simulator:");
|
|
println!(" nodes: {}", node_count);
|
|
println!(" proposer-nodes: {}", proposer_nodes);
|
|
println!(" validators-per-node: {}", validators_per_node);
|
|
println!(" speed-up-factor: {}", speed_up_factor);
|
|
println!(" continue-after-checks: {}", continue_after_checks);
|
|
println!(" log-dir: {:?}", log_dir);
|
|
println!(" disable-stdout-logging: {}", disable_stdout_logging);
|
|
|
|
// Generate the directories and keystores required for the validator clients.
|
|
let validator_files = (0..node_count)
|
|
.into_par_iter()
|
|
.map(|i| {
|
|
println!(
|
|
"Generating keystores for validator {} of {}",
|
|
i + 1,
|
|
node_count
|
|
);
|
|
|
|
let indices =
|
|
(i * validators_per_node..(i + 1) * validators_per_node).collect::<Vec<_>>();
|
|
ValidatorFiles::with_keystores(&indices).unwrap()
|
|
})
|
|
.collect::<Vec<_>>();
|
|
|
|
let (
|
|
env_builder,
|
|
logger_config,
|
|
stdout_logging_layer,
|
|
file_logging_layer,
|
|
_sse_logging_layer_opt,
|
|
libp2p_discv5_layer,
|
|
) = tracing_common::construct_logger(
|
|
LoggerConfig {
|
|
path: log_dir,
|
|
debug_level: tracing_common::parse_level(&log_level.clone()),
|
|
logfile_debug_level: tracing_common::parse_level(&log_level.clone()),
|
|
log_format: None,
|
|
logfile_format: None,
|
|
log_color: true,
|
|
logfile_color: false,
|
|
disable_log_timestamp: false,
|
|
max_log_size: 200,
|
|
max_log_number: 5,
|
|
compression: false,
|
|
is_restricted: true,
|
|
sse_logging: false,
|
|
extra_info: false,
|
|
},
|
|
matches,
|
|
EnvironmentBuilder::minimal(),
|
|
);
|
|
|
|
let workspace_filter = build_workspace_filter()?;
|
|
let mut logging_layers = vec![];
|
|
if !disable_stdout_logging {
|
|
logging_layers.push(
|
|
stdout_logging_layer
|
|
.with_filter(logger_config.debug_level)
|
|
.with_filter(workspace_filter.clone())
|
|
.boxed(),
|
|
);
|
|
}
|
|
if let Some(file_logging_layer) = file_logging_layer {
|
|
logging_layers.push(
|
|
file_logging_layer
|
|
.with_filter(logger_config.logfile_debug_level)
|
|
.with_filter(workspace_filter)
|
|
.boxed(),
|
|
);
|
|
}
|
|
if let Some(libp2p_discv5_layer) = libp2p_discv5_layer {
|
|
logging_layers.push(
|
|
libp2p_discv5_layer
|
|
.with_filter(
|
|
EnvFilter::builder()
|
|
.with_default_directive(Level::DEBUG.into())
|
|
.from_env_lossy(),
|
|
)
|
|
.boxed(),
|
|
);
|
|
}
|
|
|
|
if let Err(e) = tracing_subscriber::registry()
|
|
.with(logging_layers)
|
|
.try_init()
|
|
{
|
|
eprintln!("Failed to initialize dependency logging: {e}");
|
|
}
|
|
|
|
let mut env = env_builder.multi_threaded_tokio_runtime()?.build()?;
|
|
|
|
let mut spec = (*env.eth2_config.spec).clone();
|
|
|
|
let total_validator_count = validators_per_node * node_count;
|
|
let genesis_delay = GENESIS_DELAY;
|
|
|
|
// Convenience variables. Update these values when adding a newer fork.
|
|
let latest_fork_version = spec.electra_fork_version;
|
|
let latest_fork_start_epoch = ELECTRA_FORK_EPOCH;
|
|
|
|
spec.seconds_per_slot /= speed_up_factor;
|
|
spec.seconds_per_slot = max(1, spec.seconds_per_slot);
|
|
spec.genesis_delay = genesis_delay;
|
|
spec.min_genesis_time = 0;
|
|
spec.min_genesis_active_validator_count = total_validator_count as u64;
|
|
spec.altair_fork_epoch = Some(Epoch::new(ALTAIR_FORK_EPOCH));
|
|
spec.bellatrix_fork_epoch = Some(Epoch::new(BELLATRIX_FORK_EPOCH));
|
|
spec.capella_fork_epoch = Some(Epoch::new(CAPELLA_FORK_EPOCH));
|
|
spec.deneb_fork_epoch = Some(Epoch::new(DENEB_FORK_EPOCH));
|
|
spec.electra_fork_epoch = Some(Epoch::new(ELECTRA_FORK_EPOCH));
|
|
let spec = Arc::new(spec);
|
|
env.eth2_config.spec = spec.clone();
|
|
|
|
let slot_duration = Duration::from_secs(spec.seconds_per_slot);
|
|
let slots_per_epoch = MinimalEthSpec::slots_per_epoch();
|
|
let initial_validator_count = spec.min_genesis_active_validator_count as usize;
|
|
|
|
let context = env.core_context();
|
|
|
|
let main_future = async {
|
|
/*
|
|
* Create a new `LocalNetwork` with one beacon node.
|
|
*/
|
|
let max_retries = 3;
|
|
let (network, beacon_config, mock_execution_config) = with_retry(max_retries, || {
|
|
Box::pin(LocalNetwork::create_local_network(
|
|
None,
|
|
None,
|
|
LocalNetworkParams {
|
|
validator_count: total_validator_count,
|
|
node_count,
|
|
extra_nodes,
|
|
proposer_nodes,
|
|
genesis_delay,
|
|
},
|
|
context.clone(),
|
|
))
|
|
})
|
|
.await?;
|
|
|
|
// Add nodes to the network.
|
|
for _ in 0..node_count {
|
|
network
|
|
.add_beacon_node(beacon_config.clone(), mock_execution_config.clone(), false)
|
|
.await?;
|
|
}
|
|
|
|
/*
|
|
* One by one, add proposer nodes to the network.
|
|
*/
|
|
for _ in 0..proposer_nodes {
|
|
println!("Adding a proposer node");
|
|
network
|
|
.add_beacon_node(beacon_config.clone(), mock_execution_config.clone(), true)
|
|
.await?;
|
|
}
|
|
|
|
/*
|
|
* One by one, add validators to the network.
|
|
*/
|
|
|
|
let executor = context.executor.clone();
|
|
for (i, files) in validator_files.into_iter().enumerate() {
|
|
let network_1 = network.clone();
|
|
executor.spawn(
|
|
async move {
|
|
let mut validator_config = testing_validator_config();
|
|
validator_config.validator_store.fee_recipient =
|
|
Some(SUGGESTED_FEE_RECIPIENT.into());
|
|
println!("Adding validator client {}", i);
|
|
|
|
// Enable broadcast on every 4th node.
|
|
if i % 4 == 0 {
|
|
validator_config.broadcast_topics = ApiTopic::all();
|
|
let beacon_nodes = vec![i, (i + 1) % node_count];
|
|
network_1
|
|
.add_validator_client_with_fallbacks(
|
|
validator_config,
|
|
i,
|
|
beacon_nodes,
|
|
files,
|
|
)
|
|
.await
|
|
} else {
|
|
network_1
|
|
.add_validator_client(validator_config, i, files)
|
|
.await
|
|
}
|
|
.expect("should add validator");
|
|
},
|
|
"vc",
|
|
);
|
|
}
|
|
|
|
// Set all payloads as valid. This effectively assumes the EL is infalliable.
|
|
network.execution_nodes.write().iter().for_each(|node| {
|
|
node.server.all_payloads_valid();
|
|
});
|
|
|
|
let duration_to_genesis = network.duration_to_genesis().await?;
|
|
println!("Duration to genesis: {}", duration_to_genesis.as_secs());
|
|
sleep(duration_to_genesis).await;
|
|
|
|
/*
|
|
* Start the checks that ensure the network performs as expected.
|
|
*
|
|
* We start these checks immediately after the validators have started. This means we're
|
|
* relying on the validator futures to all return immediately after genesis so that these
|
|
* tests start at the right time. Whilst this is works well for now, it's subject to
|
|
* breakage by changes to the VC.
|
|
*/
|
|
let network_1 = network.clone();
|
|
|
|
let (
|
|
finalization,
|
|
block_prod,
|
|
validator_count,
|
|
onboarding,
|
|
fork,
|
|
sync_aggregate,
|
|
transition,
|
|
light_client_update,
|
|
blobs,
|
|
start_node_with_delay,
|
|
sync,
|
|
) = futures::join!(
|
|
// Check that the chain finalizes at the first given opportunity.
|
|
checks::verify_first_finalization(network.clone(), slot_duration),
|
|
// Check that a block is produced at every slot.
|
|
checks::verify_full_block_production_up_to(
|
|
network.clone(),
|
|
Epoch::new(END_EPOCH).start_slot(slots_per_epoch),
|
|
slot_duration,
|
|
),
|
|
// Check that the chain starts with the expected validator count.
|
|
checks::verify_initial_validator_count(
|
|
network.clone(),
|
|
slot_duration,
|
|
initial_validator_count,
|
|
),
|
|
// Check that validators greater than `spec.min_genesis_active_validator_count` are
|
|
// onboarded at the first possible opportunity.
|
|
checks::verify_validator_onboarding(
|
|
network.clone(),
|
|
slot_duration,
|
|
total_validator_count,
|
|
),
|
|
// Check that all nodes have transitioned to the required fork.
|
|
checks::verify_fork_version(
|
|
network.clone(),
|
|
Epoch::new(latest_fork_start_epoch),
|
|
slot_duration,
|
|
latest_fork_version,
|
|
),
|
|
// Check that all sync aggregates are full.
|
|
checks::verify_full_sync_aggregates_up_to(
|
|
network.clone(),
|
|
// Start checking for sync_aggregates at `FORK_EPOCH + 1` to account for
|
|
// inefficiencies in finding subnet peers at the `fork_slot`.
|
|
Epoch::new(ALTAIR_FORK_EPOCH + 1).start_slot(slots_per_epoch),
|
|
Epoch::new(END_EPOCH).start_slot(slots_per_epoch),
|
|
slot_duration,
|
|
),
|
|
// Check that the transition block is finalized.
|
|
checks::verify_transition_block_finalized(
|
|
network.clone(),
|
|
Epoch::new(TERMINAL_BLOCK / slots_per_epoch),
|
|
slot_duration,
|
|
true,
|
|
),
|
|
checks::verify_light_client_updates(
|
|
network.clone(),
|
|
// Sync aggregate available from slot 1 after Altair fork transition.
|
|
Epoch::new(ALTAIR_FORK_EPOCH).start_slot(slots_per_epoch) + 1,
|
|
Epoch::new(END_EPOCH).start_slot(slots_per_epoch),
|
|
slot_duration
|
|
),
|
|
checks::verify_full_blob_production_up_to(
|
|
network.clone(),
|
|
// Blobs should be available immediately after the Deneb fork.
|
|
Epoch::new(DENEB_FORK_EPOCH).start_slot(slots_per_epoch),
|
|
Epoch::new(END_EPOCH).start_slot(slots_per_epoch),
|
|
slot_duration
|
|
),
|
|
network_1.add_beacon_node_with_delay(
|
|
beacon_config.clone(),
|
|
mock_execution_config.clone(),
|
|
END_EPOCH - 1,
|
|
slot_duration,
|
|
slots_per_epoch
|
|
),
|
|
checks::ensure_node_synced_up_to_slot(
|
|
network.clone(),
|
|
// This must be set to be the node which was just created. Should be equal to
|
|
// `node_count`.
|
|
node_count,
|
|
Epoch::new(END_EPOCH).start_slot(slots_per_epoch),
|
|
slot_duration,
|
|
),
|
|
);
|
|
|
|
block_prod?;
|
|
finalization?;
|
|
validator_count?;
|
|
onboarding?;
|
|
fork?;
|
|
sync_aggregate?;
|
|
transition?;
|
|
light_client_update?;
|
|
blobs?;
|
|
start_node_with_delay?;
|
|
sync?;
|
|
|
|
// The `final_future` either completes immediately or never completes, depending on the value
|
|
// of `continue_after_checks`.
|
|
|
|
if continue_after_checks {
|
|
future::pending::<()>().await;
|
|
}
|
|
/*
|
|
* End the simulation by dropping the network. This will kill all running beacon nodes and
|
|
* validator clients.
|
|
*/
|
|
println!(
|
|
"Simulation complete. Finished with {} beacon nodes and {} validator clients",
|
|
network.beacon_node_count() + network.proposer_node_count(),
|
|
network.validator_client_count()
|
|
);
|
|
|
|
// Be explicit about dropping the network, as this kills all the nodes. This ensures
|
|
// all the checks have adequate time to pass.
|
|
drop(network);
|
|
Ok::<(), String>(())
|
|
};
|
|
|
|
env.runtime().block_on(main_future).unwrap();
|
|
|
|
env.fire_signal();
|
|
env.shutdown_on_idle();
|
|
|
|
Ok(())
|
|
}
|