2018-07-02 15:24:40 -07:00
|
|
|
//! The `fullnode` module hosts all the fullnode microservices.
|
|
|
|
|
2018-12-07 20:16:27 -07:00
|
|
|
use crate::bank::Bank;
|
|
|
|
use crate::cluster_info::{ClusterInfo, Node, NodeInfo};
|
2018-12-12 12:38:00 -08:00
|
|
|
use crate::counter::Counter;
|
2019-01-03 21:29:21 -08:00
|
|
|
use crate::db_ledger::DbLedger;
|
2019-01-24 12:04:04 -08:00
|
|
|
use crate::genesis_block::GenesisBlock;
|
2018-12-07 20:16:27 -07:00
|
|
|
use crate::gossip_service::GossipService;
|
|
|
|
use crate::leader_scheduler::LeaderScheduler;
|
|
|
|
use crate::rpc::JsonRpcService;
|
|
|
|
use crate::rpc_pubsub::PubSubService;
|
|
|
|
use crate::service::Service;
|
|
|
|
use crate::tpu::{Tpu, TpuReturnType};
|
2018-12-12 20:57:48 -06:00
|
|
|
use crate::tvu::{Sockets, Tvu, TvuReturnType};
|
2019-01-11 12:58:31 -08:00
|
|
|
use crate::vote_signer_proxy::VoteSignerProxy;
|
2018-12-12 12:38:00 -08:00
|
|
|
use log::Level;
|
2018-11-16 08:04:46 -08:00
|
|
|
use solana_sdk::hash::Hash;
|
2018-12-03 10:26:28 -08:00
|
|
|
use solana_sdk::signature::{Keypair, KeypairUtil};
|
2019-01-16 10:14:18 -08:00
|
|
|
use solana_sdk::timing::{duration_as_ms, timestamp};
|
2018-09-14 01:53:18 -07:00
|
|
|
use std::net::UdpSocket;
|
2018-11-06 12:57:41 -07:00
|
|
|
use std::net::{IpAddr, Ipv4Addr, SocketAddr};
|
2018-12-12 12:38:00 -08:00
|
|
|
use std::sync::atomic::{AtomicBool, AtomicUsize, Ordering};
|
2019-01-26 13:58:08 +05:30
|
|
|
use std::sync::mpsc::channel;
|
|
|
|
use std::sync::mpsc::{Receiver, Sender};
|
2018-07-02 15:24:40 -07:00
|
|
|
use std::sync::{Arc, RwLock};
|
2018-09-13 14:00:17 -07:00
|
|
|
use std::thread::Result;
|
2019-01-16 10:14:18 -08:00
|
|
|
use std::time::Instant;
|
2018-07-02 11:20:35 -07:00
|
|
|
|
2019-01-26 13:58:08 +05:30
|
|
|
pub type TvuRotationSender = Sender<TvuReturnType>;
|
|
|
|
pub type TvuRotationReceiver = Receiver<TvuReturnType>;
|
|
|
|
pub type TpuRotationSender = Sender<TpuReturnType>;
|
|
|
|
pub type TpuRotationReceiver = Receiver<TpuReturnType>;
|
2018-09-13 14:00:17 -07:00
|
|
|
|
2019-01-26 13:58:08 +05:30
|
|
|
pub struct NodeServices {
|
2018-09-13 14:00:17 -07:00
|
|
|
tpu: Tpu,
|
|
|
|
tvu: Tvu,
|
|
|
|
}
|
|
|
|
|
2019-01-26 13:58:08 +05:30
|
|
|
impl NodeServices {
|
|
|
|
fn new(tpu: Tpu, tvu: Tvu) -> Self {
|
|
|
|
NodeServices { tpu, tvu }
|
2018-09-13 14:00:17 -07:00
|
|
|
}
|
|
|
|
|
2019-01-26 13:58:08 +05:30
|
|
|
pub fn join(self) -> Result<()> {
|
|
|
|
self.tpu.join()?;
|
|
|
|
//tvu will never stop unless exit is signaled
|
|
|
|
self.tvu.join()?;
|
|
|
|
Ok(())
|
2018-09-13 14:00:17 -07:00
|
|
|
}
|
2018-09-14 14:34:32 -07:00
|
|
|
|
2018-10-10 16:49:41 -07:00
|
|
|
pub fn is_exited(&self) -> bool {
|
2019-01-26 13:58:08 +05:30
|
|
|
self.tpu.is_exited() && self.tvu.is_exited()
|
2018-10-10 16:49:41 -07:00
|
|
|
}
|
|
|
|
|
2018-12-07 20:01:28 -07:00
|
|
|
pub fn exit(&self) {
|
2019-01-26 13:58:08 +05:30
|
|
|
self.tpu.exit();
|
|
|
|
self.tvu.exit();
|
2018-09-14 14:34:32 -07:00
|
|
|
}
|
2018-09-13 14:00:17 -07:00
|
|
|
}
|
|
|
|
|
2018-10-18 22:57:48 -07:00
|
|
|
#[derive(Debug)]
|
2018-09-14 00:17:40 -07:00
|
|
|
pub enum FullnodeReturnType {
|
2018-10-10 16:49:41 -07:00
|
|
|
LeaderToValidatorRotation,
|
|
|
|
ValidatorToLeaderRotation,
|
2018-09-13 14:00:17 -07:00
|
|
|
}
|
|
|
|
|
2018-08-09 15:29:07 -06:00
|
|
|
pub struct Fullnode {
|
2018-09-14 01:53:18 -07:00
|
|
|
keypair: Arc<Keypair>,
|
2018-07-09 14:53:18 -06:00
|
|
|
exit: Arc<AtomicBool>,
|
2018-10-25 16:58:40 -07:00
|
|
|
rpc_service: Option<JsonRpcService>,
|
|
|
|
rpc_pubsub_service: Option<PubSubService>,
|
2018-12-06 13:52:47 -07:00
|
|
|
gossip_service: GossipService,
|
2018-09-14 01:53:18 -07:00
|
|
|
bank: Arc<Bank>,
|
2018-10-08 20:55:54 -06:00
|
|
|
cluster_info: Arc<RwLock<ClusterInfo>>,
|
2018-09-25 15:41:29 -07:00
|
|
|
sigverify_disabled: bool,
|
2018-12-07 15:09:29 -07:00
|
|
|
tpu_sockets: Vec<UdpSocket>,
|
2018-09-25 15:41:29 -07:00
|
|
|
broadcast_socket: UdpSocket,
|
2019-01-26 13:58:08 +05:30
|
|
|
pub node_services: NodeServices,
|
|
|
|
pub role_notifiers: (TvuRotationReceiver, TpuRotationReceiver),
|
2018-07-02 15:24:40 -07:00
|
|
|
}
|
2018-07-02 11:20:35 -07:00
|
|
|
|
2018-08-09 15:29:07 -06:00
|
|
|
impl Fullnode {
|
2018-08-22 17:39:34 -06:00
|
|
|
pub fn new(
|
2018-08-28 16:32:40 -07:00
|
|
|
node: Node,
|
2018-08-03 11:06:06 -07:00
|
|
|
ledger_path: &str,
|
2018-10-25 16:58:40 -07:00
|
|
|
keypair: Arc<Keypair>,
|
2019-01-23 18:05:06 -08:00
|
|
|
vote_signer: Option<Arc<VoteSignerProxy>>,
|
2019-01-21 11:14:27 -08:00
|
|
|
entrypoint_addr: Option<SocketAddr>,
|
2018-07-31 16:54:24 -07:00
|
|
|
sigverify_disabled: bool,
|
2019-01-26 13:58:08 +05:30
|
|
|
leader_scheduler: Arc<RwLock<LeaderScheduler>>,
|
2018-11-05 10:50:58 -07:00
|
|
|
rpc_port: Option<u16>,
|
2019-01-02 11:02:15 -08:00
|
|
|
) -> Self {
|
|
|
|
// TODO: remove this, temporary parameter to configure
|
|
|
|
// storage amount differently for test configurations
|
|
|
|
// so tests don't take forever to run.
|
|
|
|
const NUM_HASHES_FOR_STORAGE_ROTATE: u64 = 1024;
|
|
|
|
Self::new_with_storage_rotate(
|
|
|
|
node,
|
|
|
|
ledger_path,
|
|
|
|
keypair,
|
|
|
|
vote_signer,
|
2019-01-21 11:14:27 -08:00
|
|
|
entrypoint_addr,
|
2019-01-02 11:02:15 -08:00
|
|
|
sigverify_disabled,
|
|
|
|
leader_scheduler,
|
|
|
|
rpc_port,
|
|
|
|
NUM_HASHES_FOR_STORAGE_ROTATE,
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn new_with_storage_rotate(
|
|
|
|
node: Node,
|
|
|
|
ledger_path: &str,
|
|
|
|
keypair: Arc<Keypair>,
|
2019-01-23 18:05:06 -08:00
|
|
|
vote_signer: Option<Arc<VoteSignerProxy>>,
|
2019-01-21 11:14:27 -08:00
|
|
|
entrypoint_addr: Option<SocketAddr>,
|
2019-01-02 11:02:15 -08:00
|
|
|
sigverify_disabled: bool,
|
2019-01-26 13:58:08 +05:30
|
|
|
leader_scheduler: Arc<RwLock<LeaderScheduler>>,
|
2019-01-02 11:02:15 -08:00
|
|
|
rpc_port: Option<u16>,
|
|
|
|
storage_rotate_count: u64,
|
2018-08-09 15:29:07 -06:00
|
|
|
) -> Self {
|
2018-07-02 15:24:40 -07:00
|
|
|
info!("creating bank...");
|
2019-01-24 12:04:04 -08:00
|
|
|
let (genesis_block, db_ledger) = Self::make_db_ledger(ledger_path);
|
2018-11-12 12:41:19 -08:00
|
|
|
let (bank, entry_height, last_entry_id) =
|
2019-01-24 12:04:04 -08:00
|
|
|
Self::new_bank_from_db_ledger(&genesis_block, &db_ledger, leader_scheduler);
|
2018-07-02 11:20:35 -07:00
|
|
|
|
2018-07-02 15:24:40 -07:00
|
|
|
info!("creating networking stack...");
|
|
|
|
let local_gossip_addr = node.sockets.gossip.local_addr().unwrap();
|
2018-09-14 01:53:18 -07:00
|
|
|
|
2018-07-02 11:20:35 -07:00
|
|
|
info!(
|
2018-07-02 15:24:40 -07:00
|
|
|
"starting... local gossip address: {} (advertising {})",
|
2018-12-06 13:52:47 -07:00
|
|
|
local_gossip_addr, node.info.gossip
|
2018-07-02 11:20:35 -07:00
|
|
|
);
|
2018-11-15 13:23:26 -08:00
|
|
|
let mut rpc_addr = node.info.rpc;
|
2018-11-05 10:50:58 -07:00
|
|
|
if let Some(port) = rpc_port {
|
|
|
|
rpc_addr.set_port(port);
|
|
|
|
}
|
2019-01-19 20:03:20 -08:00
|
|
|
info!("node rpc address: {}", rpc_addr);
|
2019-01-21 11:14:27 -08:00
|
|
|
info!("node entrypoint_addr: {:?}", entrypoint_addr);
|
2018-09-10 23:38:40 -07:00
|
|
|
|
2019-01-21 11:14:27 -08:00
|
|
|
let entrypoint_info = entrypoint_addr.map(|i| NodeInfo::new_entry_point(&i));
|
2019-01-24 12:04:04 -08:00
|
|
|
Self::new_with_bank_and_db_ledger(
|
2018-08-22 16:45:49 -06:00
|
|
|
keypair,
|
2019-01-11 12:58:31 -08:00
|
|
|
vote_signer,
|
2018-08-22 16:45:49 -06:00
|
|
|
bank,
|
2019-01-26 13:58:08 +05:30
|
|
|
&db_ledger,
|
2018-08-22 16:45:49 -06:00
|
|
|
entry_height,
|
2018-11-12 12:41:19 -08:00
|
|
|
&last_entry_id,
|
2018-08-22 16:45:49 -06:00
|
|
|
node,
|
2019-01-21 11:14:27 -08:00
|
|
|
entrypoint_info.as_ref(),
|
2018-08-22 16:45:49 -06:00
|
|
|
sigverify_disabled,
|
2018-11-05 10:50:58 -07:00
|
|
|
rpc_port,
|
2019-01-02 11:02:15 -08:00
|
|
|
storage_rotate_count,
|
2019-01-19 20:03:20 -08:00
|
|
|
)
|
2018-08-22 16:45:49 -06:00
|
|
|
}
|
|
|
|
|
2018-12-07 20:01:28 -07:00
|
|
|
#[allow(clippy::too_many_arguments)]
|
2018-09-11 18:40:38 -07:00
|
|
|
pub fn new_with_bank(
|
2018-10-25 16:58:40 -07:00
|
|
|
keypair: Arc<Keypair>,
|
2019-01-23 18:05:06 -08:00
|
|
|
vote_signer: Option<Arc<VoteSignerProxy>>,
|
2018-08-22 18:50:19 -06:00
|
|
|
bank: Bank,
|
2019-01-24 12:04:04 -08:00
|
|
|
ledger_path: &str,
|
|
|
|
entry_height: u64,
|
|
|
|
last_entry_id: &Hash,
|
|
|
|
node: Node,
|
|
|
|
entrypoint_info_option: Option<&NodeInfo>,
|
|
|
|
sigverify_disabled: bool,
|
|
|
|
rpc_port: Option<u16>,
|
|
|
|
storage_rotate_count: u64,
|
|
|
|
) -> Self {
|
2019-01-26 13:58:08 +05:30
|
|
|
let (_genesis_block, db_ledger) = Self::make_db_ledger(ledger_path);
|
2019-01-24 12:04:04 -08:00
|
|
|
Self::new_with_bank_and_db_ledger(
|
|
|
|
keypair,
|
|
|
|
vote_signer,
|
|
|
|
bank,
|
2019-01-26 13:58:08 +05:30
|
|
|
&db_ledger,
|
2019-01-24 12:04:04 -08:00
|
|
|
entry_height,
|
|
|
|
&last_entry_id,
|
|
|
|
node,
|
|
|
|
entrypoint_info_option,
|
|
|
|
sigverify_disabled,
|
|
|
|
rpc_port,
|
|
|
|
storage_rotate_count,
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Create a fullnode instance acting as a leader or validator.
|
|
|
|
#[allow(clippy::too_many_arguments)]
|
|
|
|
pub fn new_with_bank_and_db_ledger(
|
|
|
|
keypair: Arc<Keypair>,
|
|
|
|
vote_signer: Option<Arc<VoteSignerProxy>>,
|
|
|
|
bank: Bank,
|
2019-01-26 13:58:08 +05:30
|
|
|
db_ledger: &Arc<DbLedger>,
|
2018-07-02 15:24:40 -07:00
|
|
|
entry_height: u64,
|
2018-11-12 12:41:19 -08:00
|
|
|
last_entry_id: &Hash,
|
2018-11-05 10:50:58 -07:00
|
|
|
mut node: Node,
|
2019-01-21 11:14:27 -08:00
|
|
|
entrypoint_info_option: Option<&NodeInfo>,
|
2018-08-22 18:50:19 -06:00
|
|
|
sigverify_disabled: bool,
|
2018-09-20 23:38:59 -06:00
|
|
|
rpc_port: Option<u16>,
|
2019-01-02 11:02:15 -08:00
|
|
|
storage_rotate_count: u64,
|
2018-08-22 18:50:19 -06:00
|
|
|
) -> Self {
|
2018-11-15 13:23:26 -08:00
|
|
|
let mut rpc_addr = node.info.rpc;
|
|
|
|
let mut rpc_pubsub_addr = node.info.rpc_pubsub;
|
2018-11-05 10:50:58 -07:00
|
|
|
// Use custom RPC port, if provided (`Some(port)`)
|
|
|
|
// RPC port may be any valid open port on the node
|
|
|
|
// If rpc_port == `None`, node will listen on the ports set in NodeInfo
|
|
|
|
if let Some(port) = rpc_port {
|
|
|
|
rpc_addr.set_port(port);
|
2018-11-15 13:23:26 -08:00
|
|
|
node.info.rpc = rpc_addr;
|
2018-11-05 10:50:58 -07:00
|
|
|
rpc_pubsub_addr.set_port(port + 1);
|
2018-11-15 13:23:26 -08:00
|
|
|
node.info.rpc_pubsub = rpc_pubsub_addr;
|
2018-11-05 10:50:58 -07:00
|
|
|
}
|
|
|
|
|
2018-09-10 23:38:40 -07:00
|
|
|
let exit = Arc::new(AtomicBool::new(false));
|
2018-08-22 18:50:19 -06:00
|
|
|
let bank = Arc::new(bank);
|
2018-08-14 18:03:48 -06:00
|
|
|
|
2018-11-15 13:23:26 -08:00
|
|
|
node.info.wallclock = timestamp();
|
2018-12-01 12:00:30 -08:00
|
|
|
let cluster_info = Arc::new(RwLock::new(ClusterInfo::new_with_keypair(
|
|
|
|
node.info,
|
|
|
|
keypair.clone(),
|
|
|
|
)));
|
2018-08-22 18:50:19 -06:00
|
|
|
|
2019-01-21 11:14:27 -08:00
|
|
|
// TODO: The RPC service assumes that there is a drone running on the cluster
|
|
|
|
// entrypoint, which is a bad assumption.
|
|
|
|
// See https://github.com/solana-labs/solana/issues/1830 for the removal of drone
|
|
|
|
// from the RPC API
|
|
|
|
let drone_addr = {
|
|
|
|
let mut entrypoint_drone_addr = match entrypoint_info_option {
|
|
|
|
Some(entrypoint_info_info) => entrypoint_info_info.rpc,
|
|
|
|
None => rpc_addr,
|
|
|
|
};
|
|
|
|
entrypoint_drone_addr.set_port(solana_drone::drone::DRONE_PORT);
|
|
|
|
entrypoint_drone_addr
|
2019-01-04 17:20:51 -08:00
|
|
|
};
|
|
|
|
|
2019-01-15 12:20:07 -08:00
|
|
|
let rpc_service = JsonRpcService::new(
|
|
|
|
&bank,
|
|
|
|
&cluster_info,
|
|
|
|
SocketAddr::new(IpAddr::V4(Ipv4Addr::new(0, 0, 0, 0)), rpc_addr.port()),
|
|
|
|
drone_addr,
|
|
|
|
);
|
|
|
|
|
|
|
|
let rpc_pubsub_service = PubSubService::new(
|
|
|
|
&bank,
|
|
|
|
SocketAddr::new(
|
|
|
|
IpAddr::V4(Ipv4Addr::new(0, 0, 0, 0)),
|
|
|
|
rpc_pubsub_addr.port(),
|
|
|
|
),
|
|
|
|
);
|
2018-10-12 11:04:14 -07:00
|
|
|
|
2018-12-06 13:52:47 -07:00
|
|
|
let gossip_service = GossipService::new(
|
2018-10-08 20:55:54 -06:00
|
|
|
&cluster_info,
|
2018-12-10 01:24:41 -08:00
|
|
|
Some(db_ledger.clone()),
|
2018-08-22 19:00:56 -06:00
|
|
|
node.sockets.gossip,
|
|
|
|
exit.clone(),
|
2018-09-02 23:23:43 -10:00
|
|
|
);
|
2018-08-22 19:00:56 -06:00
|
|
|
|
2019-01-21 11:14:27 -08:00
|
|
|
// Insert the entrypoint info, should only be None if this node
|
2018-10-10 16:49:41 -07:00
|
|
|
// is the bootstrap leader
|
2019-01-21 11:14:27 -08:00
|
|
|
if let Some(entrypoint_info) = entrypoint_info_option {
|
2018-11-15 13:23:26 -08:00
|
|
|
cluster_info
|
|
|
|
.write()
|
|
|
|
.unwrap()
|
2019-01-21 11:14:27 -08:00
|
|
|
.insert_info(entrypoint_info.clone());
|
2018-08-22 18:51:53 -06:00
|
|
|
}
|
2018-08-22 18:50:19 -06:00
|
|
|
|
2018-10-10 16:49:41 -07:00
|
|
|
// Get the scheduled leader
|
2018-12-12 15:58:29 -08:00
|
|
|
let (scheduled_leader, _) = bank
|
2018-10-25 16:58:40 -07:00
|
|
|
.get_current_leader()
|
2018-10-10 16:49:41 -07:00
|
|
|
.expect("Leader not known after processing bank");
|
|
|
|
|
|
|
|
cluster_info.write().unwrap().set_leader(scheduled_leader);
|
2018-11-24 19:32:33 -08:00
|
|
|
|
2019-01-26 13:58:08 +05:30
|
|
|
// todo always start leader and validator, keep leader side switching between tpu forwarder and regular tpu.
|
|
|
|
let sockets = Sockets {
|
|
|
|
repair: node
|
|
|
|
.sockets
|
|
|
|
.repair
|
|
|
|
.try_clone()
|
|
|
|
.expect("Failed to clone repair socket"),
|
|
|
|
retransmit: node
|
|
|
|
.sockets
|
|
|
|
.retransmit
|
|
|
|
.try_clone()
|
|
|
|
.expect("Failed to clone retransmit socket"),
|
|
|
|
fetch: node
|
|
|
|
.sockets
|
|
|
|
.tvu
|
|
|
|
.iter()
|
|
|
|
.map(|s| s.try_clone().expect("Failed to clone TVU Sockets"))
|
|
|
|
.collect(),
|
|
|
|
};
|
2018-12-03 00:10:43 -08:00
|
|
|
|
2019-01-26 13:58:08 +05:30
|
|
|
//setup channels for rotation indications
|
|
|
|
let (to_leader_sender, to_leader_receiver) = channel();
|
|
|
|
let (to_validator_sender, to_validator_receiver) = channel();
|
2018-10-10 16:49:41 -07:00
|
|
|
|
2019-01-26 13:58:08 +05:30
|
|
|
let tvu = Tvu::new(
|
|
|
|
vote_signer,
|
|
|
|
&bank,
|
|
|
|
entry_height,
|
|
|
|
*last_entry_id,
|
|
|
|
&cluster_info,
|
|
|
|
sockets,
|
|
|
|
db_ledger.clone(),
|
|
|
|
storage_rotate_count,
|
|
|
|
to_leader_sender,
|
|
|
|
);
|
|
|
|
let max_tick_height = {
|
|
|
|
let ls_lock = bank.leader_scheduler.read().unwrap();
|
|
|
|
ls_lock.max_height_for_leader(bank.tick_height() + 1)
|
2018-10-10 16:49:41 -07:00
|
|
|
};
|
|
|
|
|
2019-01-26 13:58:08 +05:30
|
|
|
let tpu = Tpu::new(
|
|
|
|
&Arc::new(bank.checkpoint_and_copy()),
|
|
|
|
Default::default(),
|
|
|
|
node.sockets
|
|
|
|
.tpu
|
|
|
|
.iter()
|
|
|
|
.map(|s| s.try_clone().expect("Failed to clone TPU sockets"))
|
|
|
|
.collect(),
|
|
|
|
node.sockets
|
|
|
|
.broadcast
|
|
|
|
.try_clone()
|
|
|
|
.expect("Failed to clone broadcast socket"),
|
|
|
|
cluster_info.clone(),
|
|
|
|
entry_height,
|
|
|
|
sigverify_disabled,
|
|
|
|
max_tick_height,
|
|
|
|
last_entry_id,
|
|
|
|
keypair.pubkey(),
|
|
|
|
scheduled_leader == keypair.pubkey(),
|
|
|
|
&to_validator_sender,
|
|
|
|
);
|
|
|
|
|
2018-12-12 12:38:00 -08:00
|
|
|
inc_new_counter_info!("fullnode-new", 1);
|
|
|
|
|
2018-09-13 14:00:17 -07:00
|
|
|
Fullnode {
|
2018-09-14 01:53:18 -07:00
|
|
|
keypair,
|
2018-10-08 20:55:54 -06:00
|
|
|
cluster_info,
|
2018-09-14 01:53:18 -07:00
|
|
|
bank,
|
2018-09-25 15:41:29 -07:00
|
|
|
sigverify_disabled,
|
2018-12-06 13:52:47 -07:00
|
|
|
gossip_service,
|
2018-10-25 16:58:40 -07:00
|
|
|
rpc_service: Some(rpc_service),
|
|
|
|
rpc_pubsub_service: Some(rpc_pubsub_service),
|
2019-01-26 13:58:08 +05:30
|
|
|
node_services: NodeServices::new(tpu, tvu),
|
2018-09-13 14:00:17 -07:00
|
|
|
exit,
|
2018-12-07 15:09:29 -07:00
|
|
|
tpu_sockets: node.sockets.tpu,
|
2018-09-25 15:41:29 -07:00
|
|
|
broadcast_socket: node.sockets.broadcast,
|
2019-01-26 13:58:08 +05:30
|
|
|
role_notifiers: (to_leader_receiver, to_validator_receiver),
|
2018-09-14 01:53:18 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-01-26 13:58:08 +05:30
|
|
|
pub fn leader_to_validator(&mut self) -> Result<()> {
|
2019-01-15 12:20:07 -08:00
|
|
|
trace!("leader_to_validator");
|
2018-10-25 16:58:40 -07:00
|
|
|
|
2019-01-26 13:58:08 +05:30
|
|
|
let (scheduled_leader, _) = self.bank.get_current_leader().unwrap();
|
2018-10-10 16:49:41 -07:00
|
|
|
self.cluster_info
|
|
|
|
.write()
|
|
|
|
.unwrap()
|
|
|
|
.set_leader(scheduled_leader);
|
2018-10-18 22:57:48 -07:00
|
|
|
// In the rare case that the leader exited on a multiple of seed_rotation_interval
|
|
|
|
// when the new leader schedule was being generated, and there are no other validators
|
|
|
|
// in the active set, then the leader scheduler will pick the same leader again, so
|
|
|
|
// check for that
|
|
|
|
if scheduled_leader == self.keypair.pubkey() {
|
2019-01-26 13:58:08 +05:30
|
|
|
let (last_entry_id, entry_height) = self.node_services.tvu.get_state();
|
|
|
|
self.validator_to_leader(self.bank.tick_height(), entry_height, last_entry_id);
|
2018-10-25 16:58:40 -07:00
|
|
|
Ok(())
|
|
|
|
} else {
|
2019-01-26 13:58:08 +05:30
|
|
|
self.node_services.tpu.switch_to_forwarder(
|
2018-12-07 15:09:29 -07:00
|
|
|
self.tpu_sockets
|
2018-11-16 16:42:29 -08:00
|
|
|
.iter()
|
2018-12-07 15:09:29 -07:00
|
|
|
.map(|s| s.try_clone().expect("Failed to clone TPU sockets"))
|
2018-11-16 16:42:29 -08:00
|
|
|
.collect(),
|
|
|
|
self.cluster_info.clone(),
|
|
|
|
);
|
2018-10-25 16:58:40 -07:00
|
|
|
Ok(())
|
2018-10-18 22:57:48 -07:00
|
|
|
}
|
2018-09-14 01:53:18 -07:00
|
|
|
}
|
|
|
|
|
2019-01-26 13:58:08 +05:30
|
|
|
pub fn validator_to_leader(&mut self, tick_height: u64, entry_height: u64, last_id: Hash) {
|
2019-01-15 12:20:07 -08:00
|
|
|
trace!("validator_to_leader");
|
2018-10-08 20:55:54 -06:00
|
|
|
self.cluster_info
|
|
|
|
.write()
|
|
|
|
.unwrap()
|
|
|
|
.set_leader(self.keypair.pubkey());
|
2018-10-18 22:57:48 -07:00
|
|
|
|
|
|
|
let max_tick_height = {
|
2018-10-25 16:58:40 -07:00
|
|
|
let ls_lock = self.bank.leader_scheduler.read().unwrap();
|
2018-12-03 00:10:43 -08:00
|
|
|
ls_lock.max_height_for_leader(tick_height + 1)
|
2018-10-18 22:57:48 -07:00
|
|
|
};
|
|
|
|
|
2019-01-26 13:58:08 +05:30
|
|
|
let (to_validator_sender, to_validator_receiver) = channel();
|
|
|
|
self.role_notifiers.1 = to_validator_receiver;
|
|
|
|
self.node_services.tpu.switch_to_leader(
|
|
|
|
&Arc::new(self.bank.checkpoint_and_copy()),
|
2018-09-26 05:52:13 -07:00
|
|
|
Default::default(),
|
2018-12-07 15:09:29 -07:00
|
|
|
self.tpu_sockets
|
2018-09-25 15:41:29 -07:00
|
|
|
.iter()
|
2018-12-07 15:09:29 -07:00
|
|
|
.map(|s| s.try_clone().expect("Failed to clone TPU sockets"))
|
2018-09-25 15:41:29 -07:00
|
|
|
.collect(),
|
|
|
|
self.broadcast_socket
|
|
|
|
.try_clone()
|
|
|
|
.expect("Failed to clone broadcast socket"),
|
2018-10-08 20:55:54 -06:00
|
|
|
self.cluster_info.clone(),
|
2019-01-26 13:58:08 +05:30
|
|
|
self.sigverify_disabled,
|
2018-11-13 02:21:37 -08:00
|
|
|
max_tick_height,
|
2019-01-26 13:58:08 +05:30
|
|
|
entry_height,
|
|
|
|
&last_id,
|
|
|
|
self.keypair.pubkey(),
|
|
|
|
&to_validator_sender,
|
|
|
|
)
|
2018-10-10 16:49:41 -07:00
|
|
|
}
|
|
|
|
|
2018-09-14 01:53:18 -07:00
|
|
|
pub fn handle_role_transition(&mut self) -> Result<Option<FullnodeReturnType>> {
|
2019-01-26 13:58:08 +05:30
|
|
|
loop {
|
|
|
|
if self.exit.load(Ordering::Relaxed) {
|
|
|
|
return Ok(None);
|
|
|
|
}
|
|
|
|
let should_be_forwarder = self.role_notifiers.1.try_recv();
|
|
|
|
let should_be_leader = self.role_notifiers.0.try_recv();
|
|
|
|
match should_be_leader {
|
|
|
|
Ok(TvuReturnType::LeaderRotation(tick_height, entry_height, last_entry_id)) => {
|
2018-10-18 22:57:48 -07:00
|
|
|
self.validator_to_leader(tick_height, entry_height, last_entry_id);
|
2019-01-26 13:58:08 +05:30
|
|
|
return Ok(Some(FullnodeReturnType::ValidatorToLeaderRotation));
|
2018-09-25 15:41:29 -07:00
|
|
|
}
|
2019-01-26 13:58:08 +05:30
|
|
|
_ => match should_be_forwarder {
|
|
|
|
Ok(TpuReturnType::LeaderRotation) => {
|
|
|
|
self.leader_to_validator()?;
|
|
|
|
return Ok(Some(FullnodeReturnType::LeaderToValidatorRotation));
|
|
|
|
}
|
|
|
|
_ => {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
},
|
|
|
|
}
|
2018-09-13 14:00:17 -07:00
|
|
|
}
|
2018-07-09 14:53:18 -06:00
|
|
|
}
|
|
|
|
|
2018-07-16 22:22:29 -07:00
|
|
|
//used for notifying many nodes in parallel to exit
|
2018-07-17 08:18:42 -07:00
|
|
|
pub fn exit(&self) {
|
2018-07-16 22:22:29 -07:00
|
|
|
self.exit.store(true, Ordering::Relaxed);
|
2018-10-25 16:58:40 -07:00
|
|
|
if let Some(ref rpc_service) = self.rpc_service {
|
|
|
|
rpc_service.exit();
|
|
|
|
}
|
|
|
|
if let Some(ref rpc_pubsub_service) = self.rpc_pubsub_service {
|
|
|
|
rpc_pubsub_service.exit();
|
|
|
|
}
|
2019-01-26 13:58:08 +05:30
|
|
|
self.node_services.exit()
|
2018-07-16 22:22:29 -07:00
|
|
|
}
|
2018-09-13 14:00:17 -07:00
|
|
|
|
2019-01-26 13:58:08 +05:30
|
|
|
pub fn close(self) -> Result<()> {
|
2018-07-17 08:18:42 -07:00
|
|
|
self.exit();
|
2018-07-09 14:53:18 -06:00
|
|
|
self.join()
|
2018-07-02 15:24:40 -07:00
|
|
|
}
|
2018-09-14 01:53:18 -07:00
|
|
|
|
2019-01-21 07:47:54 -08:00
|
|
|
fn new_bank_from_db_ledger(
|
2019-01-24 12:04:04 -08:00
|
|
|
genesis_block: &GenesisBlock,
|
2019-01-03 21:29:21 -08:00
|
|
|
db_ledger: &DbLedger,
|
2018-10-25 16:58:40 -07:00
|
|
|
leader_scheduler: Arc<RwLock<LeaderScheduler>>,
|
2018-10-30 10:05:18 -07:00
|
|
|
) -> (Bank, u64, Hash) {
|
2019-01-24 12:04:04 -08:00
|
|
|
let mut bank = Bank::new(genesis_block);
|
|
|
|
leader_scheduler.write().unwrap().bootstrap_leader = genesis_block.bootstrap_leader_id;
|
2018-10-25 16:58:40 -07:00
|
|
|
bank.leader_scheduler = leader_scheduler;
|
2019-01-03 21:29:21 -08:00
|
|
|
|
2019-01-16 10:14:18 -08:00
|
|
|
let now = Instant::now();
|
2019-01-03 21:29:21 -08:00
|
|
|
let entries = db_ledger.read_ledger().expect("opening ledger");
|
2018-09-14 01:53:18 -07:00
|
|
|
info!("processing ledger...");
|
2018-10-30 10:05:18 -07:00
|
|
|
|
2018-11-12 12:41:19 -08:00
|
|
|
let (entry_height, last_entry_id) = bank.process_ledger(entries).expect("process_ledger");
|
2018-09-14 01:53:18 -07:00
|
|
|
// entry_height is the network-wide agreed height of the ledger.
|
|
|
|
// initialize it from the input ledger
|
2019-01-16 10:14:18 -08:00
|
|
|
info!(
|
2019-01-24 12:04:04 -08:00
|
|
|
"processed {} ledger entries in {}ms...",
|
2019-01-16 10:14:18 -08:00
|
|
|
entry_height,
|
|
|
|
duration_as_ms(&now.elapsed())
|
|
|
|
);
|
2018-11-12 12:41:19 -08:00
|
|
|
(bank, entry_height, last_entry_id)
|
2018-09-14 01:53:18 -07:00
|
|
|
}
|
2018-10-25 16:58:40 -07:00
|
|
|
|
2019-01-03 21:29:21 -08:00
|
|
|
pub fn new_bank_from_ledger(
|
|
|
|
ledger_path: &str,
|
|
|
|
leader_scheduler: Arc<RwLock<LeaderScheduler>>,
|
|
|
|
) -> (Bank, u64, Hash) {
|
2019-01-24 12:04:04 -08:00
|
|
|
let (genesis_block, db_ledger) = Self::make_db_ledger(ledger_path);
|
|
|
|
Self::new_bank_from_db_ledger(&genesis_block, &db_ledger, leader_scheduler)
|
2019-01-03 21:29:21 -08:00
|
|
|
}
|
|
|
|
|
2018-10-25 16:58:40 -07:00
|
|
|
pub fn get_leader_scheduler(&self) -> &Arc<RwLock<LeaderScheduler>> {
|
|
|
|
&self.bank.leader_scheduler
|
|
|
|
}
|
|
|
|
|
2019-01-24 12:04:04 -08:00
|
|
|
fn make_db_ledger(ledger_path: &str) -> (GenesisBlock, Arc<DbLedger>) {
|
|
|
|
let db_ledger = Arc::new(
|
2019-01-03 21:29:21 -08:00
|
|
|
DbLedger::open(ledger_path).expect("Expected to successfully open database ledger"),
|
2019-01-24 12:04:04 -08:00
|
|
|
);
|
|
|
|
|
|
|
|
let genesis_block =
|
|
|
|
GenesisBlock::load(ledger_path).expect("Expected to successfully open genesis block");
|
|
|
|
(genesis_block, db_ledger)
|
2018-11-24 19:32:33 -08:00
|
|
|
}
|
2018-07-02 15:24:40 -07:00
|
|
|
}
|
2018-07-03 22:14:08 -06:00
|
|
|
|
2018-08-09 15:29:07 -06:00
|
|
|
impl Service for Fullnode {
|
2019-01-26 13:58:08 +05:30
|
|
|
type JoinReturnType = ();
|
2018-07-03 22:14:08 -06:00
|
|
|
|
2019-01-26 13:58:08 +05:30
|
|
|
fn join(self) -> Result<()> {
|
2018-10-25 16:58:40 -07:00
|
|
|
if let Some(rpc_service) = self.rpc_service {
|
|
|
|
rpc_service.join()?;
|
|
|
|
}
|
|
|
|
if let Some(rpc_pubsub_service) = self.rpc_pubsub_service {
|
|
|
|
rpc_pubsub_service.join()?;
|
|
|
|
}
|
|
|
|
|
2018-12-06 13:52:47 -07:00
|
|
|
self.gossip_service.join()?;
|
2019-01-26 13:58:08 +05:30
|
|
|
self.node_services.join()?;
|
|
|
|
Ok(())
|
2018-07-03 22:14:08 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-07-02 15:24:40 -07:00
|
|
|
#[cfg(test)]
|
|
|
|
mod tests {
|
2018-12-07 20:16:27 -07:00
|
|
|
use crate::bank::Bank;
|
|
|
|
use crate::cluster_info::Node;
|
|
|
|
use crate::db_ledger::*;
|
2019-01-09 14:33:44 -08:00
|
|
|
use crate::entry::make_consecutive_blobs;
|
2019-01-26 13:58:08 +05:30
|
|
|
use crate::fullnode::{Fullnode, FullnodeReturnType};
|
2018-12-07 20:16:27 -07:00
|
|
|
use crate::leader_scheduler::{
|
|
|
|
make_active_set_entries, LeaderScheduler, LeaderSchedulerConfig,
|
|
|
|
};
|
|
|
|
use crate::service::Service;
|
2019-01-02 11:02:15 -08:00
|
|
|
use crate::storage_stage::STORAGE_ROTATE_TEST_COUNT;
|
2018-12-07 20:16:27 -07:00
|
|
|
use crate::streamer::responder;
|
2019-01-26 13:58:08 +05:30
|
|
|
use crate::tpu::TpuReturnType;
|
|
|
|
use crate::tvu::TvuReturnType;
|
2019-01-10 09:21:38 -08:00
|
|
|
use crate::vote_signer_proxy::VoteSignerProxy;
|
|
|
|
use solana_sdk::signature::{Keypair, KeypairUtil};
|
2018-09-25 15:41:29 -07:00
|
|
|
use std::cmp;
|
2018-09-14 01:53:18 -07:00
|
|
|
use std::fs::remove_dir_all;
|
2018-09-25 15:41:29 -07:00
|
|
|
use std::net::UdpSocket;
|
|
|
|
use std::sync::mpsc::channel;
|
2018-10-25 16:58:40 -07:00
|
|
|
use std::sync::{Arc, RwLock};
|
2018-08-03 11:06:06 -07:00
|
|
|
|
2018-07-02 15:24:40 -07:00
|
|
|
#[test]
|
|
|
|
fn validator_exit() {
|
2018-08-09 08:57:24 -06:00
|
|
|
let keypair = Keypair::new();
|
2018-08-28 16:32:40 -07:00
|
|
|
let tn = Node::new_localhost_with_pubkey(keypair.pubkey());
|
2019-01-24 12:04:04 -08:00
|
|
|
let (genesis_block, _mint_keypair, validator_ledger_path) =
|
2018-11-02 14:32:05 -07:00
|
|
|
create_tmp_genesis("validator_exit", 10_000, keypair.pubkey(), 1000);
|
2019-01-24 12:04:04 -08:00
|
|
|
let mut bank = Bank::new(&genesis_block);
|
2018-08-31 00:10:39 -07:00
|
|
|
let entry = tn.info.clone();
|
2019-01-24 12:04:04 -08:00
|
|
|
let entry_height = 0;
|
2018-10-12 00:39:10 -07:00
|
|
|
|
2018-10-25 16:58:40 -07:00
|
|
|
let leader_scheduler = Arc::new(RwLock::new(LeaderScheduler::from_bootstrap_leader(
|
|
|
|
entry.id,
|
|
|
|
)));
|
|
|
|
bank.leader_scheduler = leader_scheduler;
|
|
|
|
|
2018-10-30 10:05:18 -07:00
|
|
|
let last_id = bank.last_id();
|
2019-01-11 12:58:31 -08:00
|
|
|
let keypair = Arc::new(keypair);
|
2019-01-25 19:47:05 -07:00
|
|
|
let signer = VoteSignerProxy::new_local(&keypair);
|
2018-09-14 01:53:18 -07:00
|
|
|
let v = Fullnode::new_with_bank(
|
2019-01-11 12:58:31 -08:00
|
|
|
keypair,
|
2019-01-23 18:05:06 -08:00
|
|
|
Some(Arc::new(signer)),
|
2018-09-14 01:53:18 -07:00
|
|
|
bank,
|
2019-01-24 12:04:04 -08:00
|
|
|
&validator_ledger_path,
|
2018-10-12 00:39:10 -07:00
|
|
|
entry_height,
|
2018-10-30 10:05:18 -07:00
|
|
|
&last_id,
|
2018-09-14 01:53:18 -07:00
|
|
|
tn,
|
|
|
|
Some(&entry),
|
|
|
|
false,
|
2018-11-05 10:50:58 -07:00
|
|
|
None,
|
2019-01-02 11:02:15 -08:00
|
|
|
STORAGE_ROTATE_TEST_COUNT,
|
2018-09-14 01:53:18 -07:00
|
|
|
);
|
2018-09-10 23:38:40 -07:00
|
|
|
v.close().unwrap();
|
2018-09-14 01:53:18 -07:00
|
|
|
remove_dir_all(validator_ledger_path).unwrap();
|
2018-07-02 11:20:35 -07:00
|
|
|
}
|
2018-09-25 15:41:29 -07:00
|
|
|
|
2018-07-17 08:18:42 -07:00
|
|
|
#[test]
|
|
|
|
fn validator_parallel_exit() {
|
2018-09-14 01:53:18 -07:00
|
|
|
let mut ledger_paths = vec![];
|
2018-08-09 15:29:07 -06:00
|
|
|
let vals: Vec<Fullnode> = (0..2)
|
2018-09-14 01:53:18 -07:00
|
|
|
.map(|i| {
|
2018-08-09 08:57:24 -06:00
|
|
|
let keypair = Keypair::new();
|
2018-08-28 16:32:40 -07:00
|
|
|
let tn = Node::new_localhost_with_pubkey(keypair.pubkey());
|
2019-01-24 12:04:04 -08:00
|
|
|
let (genesis_block, _mint_keypair, validator_ledger_path) = create_tmp_genesis(
|
2018-11-02 14:32:05 -07:00
|
|
|
&format!("validator_parallel_exit_{}", i),
|
|
|
|
10_000,
|
|
|
|
keypair.pubkey(),
|
|
|
|
1000,
|
|
|
|
);
|
2018-09-14 01:53:18 -07:00
|
|
|
ledger_paths.push(validator_ledger_path.clone());
|
2019-01-24 12:04:04 -08:00
|
|
|
let mut bank = Bank::new(&genesis_block);
|
2018-08-31 00:10:39 -07:00
|
|
|
let entry = tn.info.clone();
|
2018-10-12 00:39:10 -07:00
|
|
|
|
2018-10-25 16:58:40 -07:00
|
|
|
let leader_scheduler = Arc::new(RwLock::new(
|
|
|
|
LeaderScheduler::from_bootstrap_leader(entry.id),
|
|
|
|
));
|
|
|
|
bank.leader_scheduler = leader_scheduler;
|
|
|
|
|
2019-01-24 12:04:04 -08:00
|
|
|
let entry_height = 0;
|
2018-10-30 10:05:18 -07:00
|
|
|
let last_id = bank.last_id();
|
2019-01-11 12:58:31 -08:00
|
|
|
let keypair = Arc::new(keypair);
|
2019-01-25 19:47:05 -07:00
|
|
|
let signer = VoteSignerProxy::new_local(&keypair);
|
2018-09-14 01:53:18 -07:00
|
|
|
Fullnode::new_with_bank(
|
2019-01-11 12:58:31 -08:00
|
|
|
keypair,
|
2019-01-23 18:05:06 -08:00
|
|
|
Some(Arc::new(signer)),
|
2018-09-14 01:53:18 -07:00
|
|
|
bank,
|
2019-01-24 12:04:04 -08:00
|
|
|
&validator_ledger_path,
|
2018-10-12 00:39:10 -07:00
|
|
|
entry_height,
|
2018-10-30 10:05:18 -07:00
|
|
|
&last_id,
|
2018-09-14 01:53:18 -07:00
|
|
|
tn,
|
|
|
|
Some(&entry),
|
|
|
|
false,
|
2018-11-05 10:50:58 -07:00
|
|
|
None,
|
2019-01-02 11:02:15 -08:00
|
|
|
STORAGE_ROTATE_TEST_COUNT,
|
2018-09-14 01:53:18 -07:00
|
|
|
)
|
2018-12-07 20:01:28 -07:00
|
|
|
})
|
|
|
|
.collect();
|
2018-09-14 01:53:18 -07:00
|
|
|
|
2018-07-17 11:45:52 -07:00
|
|
|
//each validator can exit in parallel to speed many sequential calls to `join`
|
2018-08-05 22:04:27 -07:00
|
|
|
vals.iter().for_each(|v| v.exit());
|
2018-07-17 11:45:52 -07:00
|
|
|
//while join is called sequentially, the above exit call notified all the
|
2018-07-17 08:18:42 -07:00
|
|
|
//validators to exit from all their threads
|
2018-08-03 11:06:06 -07:00
|
|
|
vals.into_iter().for_each(|v| {
|
2018-08-05 22:04:27 -07:00
|
|
|
v.join().unwrap();
|
2018-08-03 11:06:06 -07:00
|
|
|
});
|
2018-09-14 01:53:18 -07:00
|
|
|
|
|
|
|
for path in ledger_paths {
|
|
|
|
remove_dir_all(path).unwrap();
|
|
|
|
}
|
2018-07-17 08:18:42 -07:00
|
|
|
}
|
2018-09-25 15:41:29 -07:00
|
|
|
|
2018-10-18 22:57:48 -07:00
|
|
|
#[test]
|
|
|
|
fn test_leader_to_leader_transition() {
|
|
|
|
// Create the leader node information
|
|
|
|
let bootstrap_leader_keypair = Keypair::new();
|
|
|
|
let bootstrap_leader_node =
|
|
|
|
Node::new_localhost_with_pubkey(bootstrap_leader_keypair.pubkey());
|
|
|
|
let bootstrap_leader_info = bootstrap_leader_node.info.clone();
|
|
|
|
|
|
|
|
// Make a mint and a genesis entries for leader ledger
|
|
|
|
let num_ending_ticks = 1;
|
2019-01-24 12:04:04 -08:00
|
|
|
let (_genesis_block, _mint_keypair, bootstrap_leader_ledger_path, genesis_entries) =
|
|
|
|
create_tmp_sample_ledger(
|
|
|
|
"test_leader_to_leader_transition",
|
|
|
|
10_000,
|
|
|
|
num_ending_ticks,
|
|
|
|
bootstrap_leader_keypair.pubkey(),
|
|
|
|
500,
|
|
|
|
);
|
2018-10-18 22:57:48 -07:00
|
|
|
|
|
|
|
let initial_tick_height = genesis_entries
|
|
|
|
.iter()
|
|
|
|
.fold(0, |tick_count, entry| tick_count + entry.is_tick() as u64);
|
|
|
|
|
|
|
|
// Create the common leader scheduling configuration
|
|
|
|
let num_slots_per_epoch = 3;
|
|
|
|
let leader_rotation_interval = 5;
|
|
|
|
let seed_rotation_interval = num_slots_per_epoch * leader_rotation_interval;
|
|
|
|
let active_window_length = 5;
|
|
|
|
|
|
|
|
// Set the bootstrap height to be bigger than the initial tick height.
|
|
|
|
// Once the leader hits the bootstrap height ticks, because there are no other
|
|
|
|
// choices in the active set, this leader will remain the leader in the next
|
|
|
|
// epoch. In the next epoch, check that the same leader knows to shut down and
|
|
|
|
// restart as a leader again.
|
|
|
|
let bootstrap_height = initial_tick_height + 1;
|
|
|
|
let leader_scheduler_config = LeaderSchedulerConfig::new(
|
|
|
|
Some(bootstrap_height as u64),
|
|
|
|
Some(leader_rotation_interval),
|
|
|
|
Some(seed_rotation_interval),
|
|
|
|
Some(active_window_length),
|
|
|
|
);
|
|
|
|
|
2019-01-11 12:58:31 -08:00
|
|
|
let bootstrap_leader_keypair = Arc::new(bootstrap_leader_keypair);
|
2019-01-25 19:47:05 -07:00
|
|
|
let signer = VoteSignerProxy::new_local(&bootstrap_leader_keypair);
|
2018-10-18 22:57:48 -07:00
|
|
|
// Start up the leader
|
|
|
|
let mut bootstrap_leader = Fullnode::new(
|
|
|
|
bootstrap_leader_node,
|
|
|
|
&bootstrap_leader_ledger_path,
|
2019-01-11 12:58:31 -08:00
|
|
|
bootstrap_leader_keypair,
|
2019-01-23 18:05:06 -08:00
|
|
|
Some(Arc::new(signer)),
|
2018-12-06 13:52:47 -07:00
|
|
|
Some(bootstrap_leader_info.gossip),
|
2018-10-18 22:57:48 -07:00
|
|
|
false,
|
2019-01-26 13:58:08 +05:30
|
|
|
Arc::new(RwLock::new(LeaderScheduler::new(&leader_scheduler_config))),
|
2018-11-05 10:50:58 -07:00
|
|
|
None,
|
2018-10-18 22:57:48 -07:00
|
|
|
);
|
|
|
|
|
|
|
|
// Wait for the leader to transition, ticks should cause the leader to
|
|
|
|
// reach the height for leader rotation
|
|
|
|
match bootstrap_leader.handle_role_transition().unwrap() {
|
|
|
|
Some(FullnodeReturnType::LeaderToValidatorRotation) => (),
|
|
|
|
_ => {
|
|
|
|
panic!("Expected a leader transition");
|
|
|
|
}
|
|
|
|
}
|
2019-01-26 13:58:08 +05:30
|
|
|
assert!(bootstrap_leader.node_services.tpu.is_leader());
|
2019-01-24 14:12:00 -08:00
|
|
|
bootstrap_leader.close().unwrap();
|
2018-10-18 22:57:48 -07:00
|
|
|
}
|
|
|
|
|
2018-10-10 16:49:41 -07:00
|
|
|
#[test]
|
|
|
|
fn test_wrong_role_transition() {
|
|
|
|
// Create the leader node information
|
2018-10-25 16:58:40 -07:00
|
|
|
let bootstrap_leader_keypair = Arc::new(Keypair::new());
|
2018-10-10 16:49:41 -07:00
|
|
|
let bootstrap_leader_node =
|
|
|
|
Node::new_localhost_with_pubkey(bootstrap_leader_keypair.pubkey());
|
|
|
|
let bootstrap_leader_info = bootstrap_leader_node.info.clone();
|
|
|
|
|
|
|
|
// Create the validator node information
|
|
|
|
let validator_keypair = Keypair::new();
|
|
|
|
let validator_node = Node::new_localhost_with_pubkey(validator_keypair.pubkey());
|
|
|
|
|
|
|
|
// Make a common mint and a genesis entry for both leader + validator's ledgers
|
2019-01-24 12:04:04 -08:00
|
|
|
let num_ending_ticks = 3;
|
|
|
|
let (_genesis_block, mint_keypair, bootstrap_leader_ledger_path, genesis_entries) =
|
|
|
|
create_tmp_sample_ledger(
|
|
|
|
"test_wrong_role_transition",
|
|
|
|
10_000,
|
|
|
|
num_ending_ticks,
|
|
|
|
bootstrap_leader_keypair.pubkey(),
|
|
|
|
500,
|
|
|
|
);
|
2018-10-10 16:49:41 -07:00
|
|
|
|
|
|
|
let last_id = genesis_entries
|
|
|
|
.last()
|
|
|
|
.expect("expected at least one genesis entry")
|
|
|
|
.id;
|
|
|
|
|
|
|
|
// Write the entries to the ledger that will cause leader rotation
|
|
|
|
// after the bootstrap height
|
2019-01-11 12:58:31 -08:00
|
|
|
let validator_keypair = Arc::new(validator_keypair);
|
2019-01-05 12:57:52 -08:00
|
|
|
let (active_set_entries, validator_vote_account_id) = make_active_set_entries(
|
2018-10-18 22:57:48 -07:00
|
|
|
&validator_keypair,
|
2019-01-24 12:04:04 -08:00
|
|
|
&mint_keypair,
|
2018-10-18 22:57:48 -07:00
|
|
|
&last_id,
|
|
|
|
&last_id,
|
|
|
|
num_ending_ticks,
|
|
|
|
);
|
2018-10-10 16:49:41 -07:00
|
|
|
|
2018-10-18 22:57:48 -07:00
|
|
|
let genesis_tick_height = genesis_entries
|
|
|
|
.iter()
|
|
|
|
.fold(0, |tick_count, entry| tick_count + entry.is_tick() as u64)
|
|
|
|
+ num_ending_ticks as u64;
|
2019-01-03 21:29:21 -08:00
|
|
|
|
|
|
|
{
|
|
|
|
let db_ledger = DbLedger::open(&bootstrap_leader_ledger_path).unwrap();
|
|
|
|
db_ledger
|
|
|
|
.write_entries(
|
|
|
|
DEFAULT_SLOT_HEIGHT,
|
|
|
|
genesis_entries.len() as u64,
|
|
|
|
&active_set_entries,
|
|
|
|
)
|
|
|
|
.unwrap();
|
|
|
|
}
|
2018-10-10 16:49:41 -07:00
|
|
|
|
2018-11-24 19:32:33 -08:00
|
|
|
let validator_ledger_path =
|
|
|
|
tmp_copy_ledger(&bootstrap_leader_ledger_path, "test_wrong_role_transition");
|
|
|
|
let ledger_paths = vec![
|
|
|
|
bootstrap_leader_ledger_path.clone(),
|
|
|
|
validator_ledger_path.clone(),
|
|
|
|
];
|
|
|
|
|
2018-10-10 16:49:41 -07:00
|
|
|
// Create the common leader scheduling configuration
|
|
|
|
let num_slots_per_epoch = 3;
|
|
|
|
let leader_rotation_interval = 5;
|
|
|
|
let seed_rotation_interval = num_slots_per_epoch * leader_rotation_interval;
|
|
|
|
|
2018-10-18 22:57:48 -07:00
|
|
|
// Set the bootstrap height exactly the current tick height, so that we can
|
2018-10-10 16:49:41 -07:00
|
|
|
// test if the bootstrap leader knows to immediately transition to a validator
|
|
|
|
// after parsing the ledger during startup
|
2018-10-18 22:57:48 -07:00
|
|
|
let bootstrap_height = genesis_tick_height;
|
2018-10-10 16:49:41 -07:00
|
|
|
let leader_scheduler_config = LeaderSchedulerConfig::new(
|
|
|
|
Some(bootstrap_height),
|
|
|
|
Some(leader_rotation_interval),
|
|
|
|
Some(seed_rotation_interval),
|
2018-10-18 22:57:48 -07:00
|
|
|
Some(genesis_tick_height),
|
2018-10-10 16:49:41 -07:00
|
|
|
);
|
|
|
|
|
2018-11-24 19:32:33 -08:00
|
|
|
{
|
|
|
|
// Test that a node knows to transition to a validator based on parsing the ledger
|
2019-01-25 19:47:05 -07:00
|
|
|
let vote_signer = VoteSignerProxy::new_local(&bootstrap_leader_keypair);
|
2018-11-24 19:32:33 -08:00
|
|
|
let bootstrap_leader = Fullnode::new(
|
|
|
|
bootstrap_leader_node,
|
|
|
|
&bootstrap_leader_ledger_path,
|
|
|
|
bootstrap_leader_keypair,
|
2019-01-23 18:05:06 -08:00
|
|
|
Some(Arc::new(vote_signer)),
|
2018-12-06 13:52:47 -07:00
|
|
|
Some(bootstrap_leader_info.gossip),
|
2018-11-24 19:32:33 -08:00
|
|
|
false,
|
2019-01-26 13:58:08 +05:30
|
|
|
Arc::new(RwLock::new(LeaderScheduler::new(&leader_scheduler_config))),
|
2018-11-24 19:32:33 -08:00
|
|
|
None,
|
|
|
|
);
|
2018-10-10 16:49:41 -07:00
|
|
|
|
2019-01-26 13:58:08 +05:30
|
|
|
assert!(!bootstrap_leader.node_services.tpu.is_leader());
|
2018-10-10 16:49:41 -07:00
|
|
|
|
2018-11-24 19:32:33 -08:00
|
|
|
// Test that a node knows to transition to a leader based on parsing the ledger
|
|
|
|
let validator = Fullnode::new(
|
|
|
|
validator_node,
|
|
|
|
&validator_ledger_path,
|
2019-01-11 12:58:31 -08:00
|
|
|
validator_keypair,
|
2019-01-23 18:05:06 -08:00
|
|
|
Some(Arc::new(validator_vote_account_id)),
|
2018-12-06 13:52:47 -07:00
|
|
|
Some(bootstrap_leader_info.gossip),
|
2018-11-24 19:32:33 -08:00
|
|
|
false,
|
2019-01-26 13:58:08 +05:30
|
|
|
Arc::new(RwLock::new(LeaderScheduler::new(&leader_scheduler_config))),
|
2018-11-24 19:32:33 -08:00
|
|
|
None,
|
|
|
|
);
|
2018-10-10 16:49:41 -07:00
|
|
|
|
2019-01-26 13:58:08 +05:30
|
|
|
assert!(validator.node_services.tpu.is_leader());
|
2018-11-24 19:32:33 -08:00
|
|
|
|
2018-12-12 15:58:29 -08:00
|
|
|
validator.close().expect("Expected leader node to close");
|
|
|
|
bootstrap_leader
|
|
|
|
.close()
|
|
|
|
.expect("Expected validator node to close");
|
2018-11-24 19:32:33 -08:00
|
|
|
}
|
|
|
|
for path in ledger_paths {
|
|
|
|
DbLedger::destroy(&path).expect("Expected successful database destruction");
|
|
|
|
let _ignored = remove_dir_all(&path);
|
2018-10-10 16:49:41 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-09-25 15:41:29 -07:00
|
|
|
#[test]
|
|
|
|
fn test_validator_to_leader_transition() {
|
|
|
|
// Make a leader identity
|
|
|
|
let leader_keypair = Keypair::new();
|
|
|
|
let leader_node = Node::new_localhost_with_pubkey(leader_keypair.pubkey());
|
|
|
|
let leader_id = leader_node.info.id;
|
2018-12-06 13:52:47 -07:00
|
|
|
let leader_gossip = leader_node.info.gossip;
|
2018-09-25 15:41:29 -07:00
|
|
|
|
2018-10-10 16:49:41 -07:00
|
|
|
// Create validator identity
|
2018-10-18 22:57:48 -07:00
|
|
|
let num_ending_ticks = 1;
|
2019-01-24 12:04:04 -08:00
|
|
|
let (_genesis_block, mint_keypair, validator_ledger_path, genesis_entries) =
|
|
|
|
create_tmp_sample_ledger(
|
|
|
|
"test_validator_to_leader_transition",
|
|
|
|
10_000,
|
|
|
|
num_ending_ticks,
|
|
|
|
leader_id,
|
|
|
|
500,
|
|
|
|
);
|
2018-10-18 22:57:48 -07:00
|
|
|
|
2018-09-25 15:41:29 -07:00
|
|
|
let validator_keypair = Keypair::new();
|
|
|
|
let validator_node = Node::new_localhost_with_pubkey(validator_keypair.pubkey());
|
|
|
|
let validator_info = validator_node.info.clone();
|
2018-10-10 16:49:41 -07:00
|
|
|
|
|
|
|
let mut last_id = genesis_entries
|
|
|
|
.last()
|
|
|
|
.expect("expected at least one genesis entry")
|
|
|
|
.id;
|
|
|
|
|
2019-01-11 12:58:31 -08:00
|
|
|
let validator_keypair = Arc::new(validator_keypair);
|
2018-10-10 16:49:41 -07:00
|
|
|
// Write two entries so that the validator is in the active set:
|
|
|
|
//
|
|
|
|
// 1) Give the validator a nonzero number of tokens
|
|
|
|
// Write the bootstrap entries to the ledger that will cause leader rotation
|
|
|
|
// after the bootstrap height
|
|
|
|
//
|
|
|
|
// 2) A vote from the validator
|
2019-01-11 12:58:31 -08:00
|
|
|
let (active_set_entries, _validator_vote_account_id) =
|
2019-01-24 12:04:04 -08:00
|
|
|
make_active_set_entries(&validator_keypair, &mint_keypair, &last_id, &last_id, 0);
|
2018-10-18 22:57:48 -07:00
|
|
|
let initial_tick_height = genesis_entries
|
|
|
|
.iter()
|
|
|
|
.fold(0, |tick_count, entry| tick_count + entry.is_tick() as u64);
|
|
|
|
let initial_non_tick_height = genesis_entries.len() as u64 - initial_tick_height;
|
|
|
|
let active_set_entries_len = active_set_entries.len() as u64;
|
|
|
|
last_id = active_set_entries.last().unwrap().id;
|
2019-01-03 21:29:21 -08:00
|
|
|
|
|
|
|
{
|
|
|
|
let db_ledger = DbLedger::open(&validator_ledger_path).unwrap();
|
|
|
|
db_ledger
|
|
|
|
.write_entries(
|
|
|
|
DEFAULT_SLOT_HEIGHT,
|
|
|
|
genesis_entries.len() as u64,
|
|
|
|
&active_set_entries,
|
|
|
|
)
|
|
|
|
.unwrap();
|
|
|
|
}
|
|
|
|
|
2018-10-18 22:57:48 -07:00
|
|
|
let ledger_initial_len = genesis_entries.len() as u64 + active_set_entries_len;
|
2018-10-10 16:49:41 -07:00
|
|
|
|
|
|
|
// Set the leader scheduler for the validator
|
2018-12-18 16:06:05 -08:00
|
|
|
let leader_rotation_interval = 16;
|
2018-10-10 16:49:41 -07:00
|
|
|
let num_bootstrap_slots = 2;
|
|
|
|
let bootstrap_height = num_bootstrap_slots * leader_rotation_interval;
|
|
|
|
|
|
|
|
let leader_scheduler_config = LeaderSchedulerConfig::new(
|
|
|
|
Some(bootstrap_height),
|
|
|
|
Some(leader_rotation_interval),
|
|
|
|
Some(leader_rotation_interval * 2),
|
|
|
|
Some(bootstrap_height),
|
|
|
|
);
|
|
|
|
|
2019-01-25 19:47:05 -07:00
|
|
|
let vote_signer = VoteSignerProxy::new_local(&validator_keypair);
|
2018-10-10 16:49:41 -07:00
|
|
|
// Start the validator
|
2019-01-26 13:58:08 +05:30
|
|
|
let validator = Fullnode::new(
|
2018-09-25 15:41:29 -07:00
|
|
|
validator_node,
|
|
|
|
&validator_ledger_path,
|
2019-01-05 12:57:52 -08:00
|
|
|
validator_keypair,
|
2019-01-23 18:05:06 -08:00
|
|
|
Some(Arc::new(vote_signer)),
|
2018-12-06 13:52:47 -07:00
|
|
|
Some(leader_gossip),
|
2018-09-25 15:41:29 -07:00
|
|
|
false,
|
2019-01-26 13:58:08 +05:30
|
|
|
Arc::new(RwLock::new(LeaderScheduler::new(&leader_scheduler_config))),
|
2018-11-05 10:50:58 -07:00
|
|
|
None,
|
2018-09-25 15:41:29 -07:00
|
|
|
);
|
|
|
|
|
|
|
|
// Send blobs to the validator from our mock leader
|
|
|
|
let t_responder = {
|
|
|
|
let (s_responder, r_responder) = channel();
|
2018-12-07 15:09:29 -07:00
|
|
|
let blob_sockets: Vec<Arc<UdpSocket>> =
|
|
|
|
leader_node.sockets.tvu.into_iter().map(Arc::new).collect();
|
2018-09-25 15:41:29 -07:00
|
|
|
let t_responder = responder(
|
|
|
|
"test_validator_to_leader_transition",
|
|
|
|
blob_sockets[0].clone(),
|
|
|
|
r_responder,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Send the blobs out of order, in reverse. Also send an extra
|
|
|
|
// "extra_blobs" number of blobs to make sure the window stops in the right place.
|
|
|
|
let extra_blobs = cmp::max(leader_rotation_interval / 3, 1);
|
2018-10-10 16:49:41 -07:00
|
|
|
let total_blobs_to_send = bootstrap_height + extra_blobs;
|
2018-11-15 13:23:26 -08:00
|
|
|
let tvu_address = &validator_info.tvu;
|
2018-10-10 16:49:41 -07:00
|
|
|
let msgs = make_consecutive_blobs(
|
2018-12-12 20:42:12 -08:00
|
|
|
&leader_id,
|
2018-10-10 16:49:41 -07:00
|
|
|
total_blobs_to_send,
|
|
|
|
ledger_initial_len,
|
|
|
|
last_id,
|
|
|
|
&tvu_address,
|
2018-12-07 20:01:28 -07:00
|
|
|
)
|
|
|
|
.into_iter()
|
2018-10-10 16:49:41 -07:00
|
|
|
.rev()
|
|
|
|
.collect();
|
2018-09-25 15:41:29 -07:00
|
|
|
s_responder.send(msgs).expect("send");
|
|
|
|
t_responder
|
|
|
|
};
|
|
|
|
|
2019-01-26 13:58:08 +05:30
|
|
|
assert_ne!(
|
|
|
|
validator.bank.get_current_leader().unwrap().0,
|
|
|
|
validator.keypair.pubkey()
|
|
|
|
);
|
|
|
|
loop {
|
|
|
|
let should_be_forwarder = validator.role_notifiers.1.try_recv();
|
|
|
|
let should_be_leader = validator.role_notifiers.0.try_recv();
|
|
|
|
match should_be_leader {
|
|
|
|
Ok(TvuReturnType::LeaderRotation(tick_height, entry_height, _)) => {
|
|
|
|
assert_eq!(validator.node_services.tvu.get_state().1, entry_height);
|
|
|
|
assert_eq!(validator.bank.tick_height(), tick_height);
|
2018-10-18 22:57:48 -07:00
|
|
|
assert_eq!(tick_height, bootstrap_height);
|
2019-01-26 13:58:08 +05:30
|
|
|
break;
|
2018-10-12 00:39:10 -07:00
|
|
|
}
|
2019-01-26 13:58:08 +05:30
|
|
|
_ => match should_be_forwarder {
|
|
|
|
Ok(TpuReturnType::LeaderRotation) => {
|
|
|
|
panic!("shouldn't be rotating to forwarder")
|
|
|
|
}
|
|
|
|
_ => continue,
|
|
|
|
},
|
2018-10-01 11:40:10 -07:00
|
|
|
}
|
2018-09-25 15:41:29 -07:00
|
|
|
}
|
|
|
|
|
2019-01-26 13:58:08 +05:30
|
|
|
//close the validator so that rocksdb has locks available
|
|
|
|
validator.close().unwrap();
|
|
|
|
let (bank, entry_height, _) = Fullnode::new_bank_from_ledger(
|
|
|
|
&validator_ledger_path,
|
2018-10-25 16:58:40 -07:00
|
|
|
Arc::new(RwLock::new(LeaderScheduler::new(&leader_scheduler_config))),
|
2018-09-25 15:41:29 -07:00
|
|
|
);
|
|
|
|
|
2019-01-03 21:29:21 -08:00
|
|
|
assert!(bank.tick_height() >= bootstrap_height);
|
|
|
|
// Only the first genesis entry has num_hashes = 0, every other entry
|
|
|
|
// had num_hashes = 1
|
|
|
|
assert!(
|
|
|
|
entry_height >= bootstrap_height + active_set_entries_len + initial_non_tick_height
|
2018-10-18 22:57:48 -07:00
|
|
|
);
|
2018-10-10 16:49:41 -07:00
|
|
|
|
2018-09-25 15:41:29 -07:00
|
|
|
// Shut down
|
|
|
|
t_responder.join().expect("responder thread join");
|
2018-11-24 19:32:33 -08:00
|
|
|
DbLedger::destroy(&validator_ledger_path)
|
|
|
|
.expect("Expected successful database destruction");
|
|
|
|
let _ignored = remove_dir_all(&validator_ledger_path).unwrap();
|
2018-09-25 15:41:29 -07:00
|
|
|
}
|
2018-07-02 11:20:35 -07:00
|
|
|
}
|