mirror of
https://github.com/sigp/lighthouse.git
synced 2026-03-11 18:04:18 +00:00
## Issue Addressed Closes #2286 Closes #2538 Closes #2342 ## Proposed Changes Part II of major slasher optimisations after #2767 These changes will be backwards-incompatible due to the move to MDBX (and the schema change) 😱 * [x] Shrink attester keys from 16 bytes to 7 bytes. * [x] Shrink attester records from 64 bytes to 6 bytes. * [x] Separate `DiskConfig` from regular `Config`. * [x] Add configuration for the LRU cache size. * [x] Add a "migration" that deletes any legacy LMDB database.
142 lines
5.0 KiB
Rust
142 lines
5.0 KiB
Rust
use crate::Error;
|
|
use serde_derive::{Deserialize, Serialize};
|
|
use std::path::PathBuf;
|
|
use types::{Epoch, EthSpec, IndexedAttestation};
|
|
|
|
pub const DEFAULT_CHUNK_SIZE: usize = 16;
|
|
pub const DEFAULT_VALIDATOR_CHUNK_SIZE: usize = 256;
|
|
pub const DEFAULT_HISTORY_LENGTH: usize = 4096;
|
|
pub const DEFAULT_UPDATE_PERIOD: u64 = 12;
|
|
pub const DEFAULT_SLOT_OFFSET: f64 = 10.5;
|
|
pub const DEFAULT_MAX_DB_SIZE: usize = 256 * 1024; // 256 GiB
|
|
pub const DEFAULT_ATTESTATION_ROOT_CACHE_SIZE: usize = 100_000;
|
|
pub const DEFAULT_BROADCAST: bool = false;
|
|
|
|
pub const MAX_HISTORY_LENGTH: usize = 1 << 16;
|
|
pub const MDBX_GROWTH_STEP: isize = 256 * (1 << 20); // 256 MiB
|
|
|
|
#[derive(Debug, Clone, Serialize, Deserialize)]
|
|
pub struct Config {
|
|
pub database_path: PathBuf,
|
|
pub chunk_size: usize,
|
|
pub validator_chunk_size: usize,
|
|
/// Number of epochs of history to keep.
|
|
pub history_length: usize,
|
|
/// Update frequency in seconds.
|
|
pub update_period: u64,
|
|
/// Offset from the start of the slot to begin processing.
|
|
pub slot_offset: f64,
|
|
/// Maximum size of the database in megabytes.
|
|
pub max_db_size_mbs: usize,
|
|
/// Maximum size of the in-memory cache for attestation roots.
|
|
pub attestation_root_cache_size: usize,
|
|
/// Whether to broadcast slashings found to the network.
|
|
pub broadcast: bool,
|
|
}
|
|
|
|
/// Immutable configuration parameters which are stored on disk and checked for consistency.
|
|
#[derive(Debug, Clone, PartialEq, Eq, Serialize, Deserialize)]
|
|
pub struct DiskConfig {
|
|
pub chunk_size: usize,
|
|
pub validator_chunk_size: usize,
|
|
pub history_length: usize,
|
|
}
|
|
|
|
impl Config {
|
|
pub fn new(database_path: PathBuf) -> Self {
|
|
Self {
|
|
database_path,
|
|
chunk_size: DEFAULT_CHUNK_SIZE,
|
|
validator_chunk_size: DEFAULT_VALIDATOR_CHUNK_SIZE,
|
|
history_length: DEFAULT_HISTORY_LENGTH,
|
|
update_period: DEFAULT_UPDATE_PERIOD,
|
|
slot_offset: DEFAULT_SLOT_OFFSET,
|
|
max_db_size_mbs: DEFAULT_MAX_DB_SIZE,
|
|
attestation_root_cache_size: DEFAULT_ATTESTATION_ROOT_CACHE_SIZE,
|
|
broadcast: DEFAULT_BROADCAST,
|
|
}
|
|
}
|
|
|
|
pub fn validate(&self) -> Result<(), Error> {
|
|
if self.chunk_size == 0
|
|
|| self.validator_chunk_size == 0
|
|
|| self.history_length == 0
|
|
|| self.max_db_size_mbs == 0
|
|
{
|
|
Err(Error::ConfigInvalidZeroParameter {
|
|
config: self.clone(),
|
|
})
|
|
} else if self.history_length % self.chunk_size != 0 {
|
|
Err(Error::ConfigInvalidChunkSize {
|
|
chunk_size: self.chunk_size,
|
|
history_length: self.history_length,
|
|
})
|
|
} else if self.history_length > MAX_HISTORY_LENGTH {
|
|
Err(Error::ConfigInvalidHistoryLength {
|
|
history_length: self.history_length,
|
|
max_history_length: MAX_HISTORY_LENGTH,
|
|
})
|
|
} else {
|
|
Ok(())
|
|
}
|
|
}
|
|
|
|
pub fn disk_config(&self) -> DiskConfig {
|
|
DiskConfig {
|
|
chunk_size: self.chunk_size,
|
|
validator_chunk_size: self.validator_chunk_size,
|
|
history_length: self.history_length,
|
|
}
|
|
}
|
|
|
|
pub fn chunk_index(&self, epoch: Epoch) -> usize {
|
|
(epoch.as_usize() % self.history_length) / self.chunk_size
|
|
}
|
|
|
|
pub fn validator_chunk_index(&self, validator_index: u64) -> usize {
|
|
validator_index as usize / self.validator_chunk_size
|
|
}
|
|
|
|
pub fn chunk_offset(&self, epoch: Epoch) -> usize {
|
|
epoch.as_usize() % self.chunk_size
|
|
}
|
|
|
|
pub fn validator_offset(&self, validator_index: u64) -> usize {
|
|
validator_index as usize % self.validator_chunk_size
|
|
}
|
|
|
|
/// Map the validator and epoch chunk indexes into a single value for use as a database key.
|
|
pub fn disk_key(&self, validator_chunk_index: usize, chunk_index: usize) -> usize {
|
|
let width = self.history_length / self.chunk_size;
|
|
validator_chunk_index * width + chunk_index
|
|
}
|
|
|
|
/// Map the validator and epoch offsets into an index for `Chunk::data`.
|
|
pub fn cell_index(&self, validator_offset: usize, chunk_offset: usize) -> usize {
|
|
validator_offset * self.chunk_size + chunk_offset
|
|
}
|
|
|
|
/// Return an iterator over all the validator indices in a validator chunk.
|
|
pub fn validator_indices_in_chunk(
|
|
&self,
|
|
validator_chunk_index: usize,
|
|
) -> impl Iterator<Item = u64> {
|
|
(validator_chunk_index * self.validator_chunk_size
|
|
..(validator_chunk_index + 1) * self.validator_chunk_size)
|
|
.map(|index| index as u64)
|
|
}
|
|
|
|
/// Iterate over the attesting indices which belong to the `validator_chunk_index` chunk.
|
|
pub fn attesting_validators_in_chunk<'a, E: EthSpec>(
|
|
&'a self,
|
|
attestation: &'a IndexedAttestation<E>,
|
|
validator_chunk_index: usize,
|
|
) -> impl Iterator<Item = u64> + 'a {
|
|
attestation
|
|
.attesting_indices
|
|
.iter()
|
|
.filter(move |v| self.validator_chunk_index(**v) == validator_chunk_index)
|
|
.copied()
|
|
}
|
|
}
|