Remove unneeded lib.rs
This commit is contained in:
		@@ -1,656 +0,0 @@
 | 
			
		||||
use bzip2::bufread::BzDecoder;
 | 
			
		||||
use clap::{crate_description, crate_name, crate_version, value_t, value_t_or_exit, App, Arg};
 | 
			
		||||
use console::{style, Emoji};
 | 
			
		||||
use indicatif::{ProgressBar, ProgressStyle};
 | 
			
		||||
use log::*;
 | 
			
		||||
use solana_client::rpc_client::RpcClient;
 | 
			
		||||
use solana_core::cluster_info::{Node, VALIDATOR_PORT_RANGE};
 | 
			
		||||
use solana_core::contact_info::ContactInfo;
 | 
			
		||||
use solana_core::gossip_service::discover;
 | 
			
		||||
use solana_core::ledger_cleanup_service::DEFAULT_MAX_LEDGER_SLOTS;
 | 
			
		||||
use solana_core::service::Service;
 | 
			
		||||
use solana_core::socketaddr;
 | 
			
		||||
use solana_core::validator::{Validator, ValidatorConfig};
 | 
			
		||||
use solana_ledger::bank_forks::SnapshotConfig;
 | 
			
		||||
use solana_sdk::clock::Slot;
 | 
			
		||||
use solana_sdk::hash::Hash;
 | 
			
		||||
use solana_sdk::signature::{read_keypair_file, Keypair, KeypairUtil};
 | 
			
		||||
use std::fs::{self, File};
 | 
			
		||||
use std::io::{self, Read};
 | 
			
		||||
use std::net::{SocketAddr, TcpListener};
 | 
			
		||||
use std::path::{Path, PathBuf};
 | 
			
		||||
use std::process::exit;
 | 
			
		||||
use std::str::FromStr;
 | 
			
		||||
use std::sync::Arc;
 | 
			
		||||
use std::time::Instant;
 | 
			
		||||
 | 
			
		||||
fn port_range_validator(port_range: String) -> Result<(), String> {
 | 
			
		||||
    if solana_netutil::parse_port_range(&port_range).is_some() {
 | 
			
		||||
        Ok(())
 | 
			
		||||
    } else {
 | 
			
		||||
        Err("Invalid port range".to_string())
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
fn hash_validator(hash: String) -> Result<(), String> {
 | 
			
		||||
    Hash::from_str(&hash)
 | 
			
		||||
        .map(|_| ())
 | 
			
		||||
        .map_err(|e| format!("{:?}", e))
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static TRUCK: Emoji = Emoji("🚚 ", "");
 | 
			
		||||
static SPARKLE: Emoji = Emoji("✨ ", "");
 | 
			
		||||
 | 
			
		||||
/// Creates a new process bar for processing that will take an unknown amount of time
 | 
			
		||||
fn new_spinner_progress_bar() -> ProgressBar {
 | 
			
		||||
    let progress_bar = ProgressBar::new(42);
 | 
			
		||||
    progress_bar
 | 
			
		||||
        .set_style(ProgressStyle::default_spinner().template("{spinner:.green} {wide_msg}"));
 | 
			
		||||
    progress_bar.enable_steady_tick(100);
 | 
			
		||||
    progress_bar
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
fn download_tar_bz2(
 | 
			
		||||
    rpc_addr: &SocketAddr,
 | 
			
		||||
    archive_name: &str,
 | 
			
		||||
    download_path: &Path,
 | 
			
		||||
    extract: bool,
 | 
			
		||||
) -> Result<(), String> {
 | 
			
		||||
    let archive_path = download_path.join(archive_name);
 | 
			
		||||
    if archive_path.is_file() {
 | 
			
		||||
        return Ok(());
 | 
			
		||||
    }
 | 
			
		||||
    let temp_archive_path = {
 | 
			
		||||
        let mut p = archive_path.clone();
 | 
			
		||||
        p.set_extension(".tmp");
 | 
			
		||||
        p
 | 
			
		||||
    };
 | 
			
		||||
 | 
			
		||||
    let url = format!("http://{}/{}", rpc_addr, archive_name);
 | 
			
		||||
    let download_start = Instant::now();
 | 
			
		||||
 | 
			
		||||
    let progress_bar = new_spinner_progress_bar();
 | 
			
		||||
    progress_bar.set_message(&format!("{}Downloading {}...", TRUCK, url));
 | 
			
		||||
 | 
			
		||||
    let client = reqwest::Client::new();
 | 
			
		||||
    let response = client
 | 
			
		||||
        .get(url.as_str())
 | 
			
		||||
        .send()
 | 
			
		||||
        .and_then(|response| response.error_for_status())
 | 
			
		||||
        .map_err(|err| format!("Unable to get: {:?}", err))?;
 | 
			
		||||
    let download_size = {
 | 
			
		||||
        response
 | 
			
		||||
            .headers()
 | 
			
		||||
            .get(reqwest::header::CONTENT_LENGTH)
 | 
			
		||||
            .and_then(|content_length| content_length.to_str().ok())
 | 
			
		||||
            .and_then(|content_length| content_length.parse().ok())
 | 
			
		||||
            .unwrap_or(0)
 | 
			
		||||
    };
 | 
			
		||||
    progress_bar.set_length(download_size);
 | 
			
		||||
    progress_bar.set_style(
 | 
			
		||||
        ProgressStyle::default_bar()
 | 
			
		||||
            .template(&format!(
 | 
			
		||||
                "{}{}Downloading {} {}",
 | 
			
		||||
                "{spinner:.green} ",
 | 
			
		||||
                TRUCK,
 | 
			
		||||
                url,
 | 
			
		||||
                "[{bar:40.cyan/blue}] {bytes}/{total_bytes} ({eta})"
 | 
			
		||||
            ))
 | 
			
		||||
            .progress_chars("=> "),
 | 
			
		||||
    );
 | 
			
		||||
 | 
			
		||||
    struct DownloadProgress<R> {
 | 
			
		||||
        progress_bar: ProgressBar,
 | 
			
		||||
        response: R,
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    impl<R: Read> Read for DownloadProgress<R> {
 | 
			
		||||
        fn read(&mut self, buf: &mut [u8]) -> io::Result<usize> {
 | 
			
		||||
            self.response.read(buf).map(|n| {
 | 
			
		||||
                self.progress_bar.inc(n as u64);
 | 
			
		||||
                n
 | 
			
		||||
            })
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    let mut source = DownloadProgress {
 | 
			
		||||
        progress_bar,
 | 
			
		||||
        response,
 | 
			
		||||
    };
 | 
			
		||||
 | 
			
		||||
    let mut file = File::create(&temp_archive_path)
 | 
			
		||||
        .map_err(|err| format!("Unable to create {:?}: {:?}", temp_archive_path, err))?;
 | 
			
		||||
    std::io::copy(&mut source, &mut file)
 | 
			
		||||
        .map_err(|err| format!("Unable to write {:?}: {:?}", temp_archive_path, err))?;
 | 
			
		||||
 | 
			
		||||
    source.progress_bar.finish_and_clear();
 | 
			
		||||
    println!(
 | 
			
		||||
        "  {}{}",
 | 
			
		||||
        SPARKLE,
 | 
			
		||||
        format!(
 | 
			
		||||
            "Downloaded {} ({} bytes) in {:?}",
 | 
			
		||||
            url,
 | 
			
		||||
            download_size,
 | 
			
		||||
            Instant::now().duration_since(download_start),
 | 
			
		||||
        )
 | 
			
		||||
    );
 | 
			
		||||
 | 
			
		||||
    if extract {
 | 
			
		||||
        println!("Extracting {:?}...", archive_path);
 | 
			
		||||
        let extract_start = Instant::now();
 | 
			
		||||
        let tar_bz2 = File::open(&temp_archive_path)
 | 
			
		||||
            .map_err(|err| format!("Unable to open {}: {:?}", archive_name, err))?;
 | 
			
		||||
        let tar = BzDecoder::new(std::io::BufReader::new(tar_bz2));
 | 
			
		||||
        let mut archive = tar::Archive::new(tar);
 | 
			
		||||
        archive
 | 
			
		||||
            .unpack(download_path)
 | 
			
		||||
            .map_err(|err| format!("Unable to unpack {}: {:?}", archive_name, err))?;
 | 
			
		||||
        println!(
 | 
			
		||||
            "Extracted {} in {:?}",
 | 
			
		||||
            archive_name,
 | 
			
		||||
            Instant::now().duration_since(extract_start)
 | 
			
		||||
        );
 | 
			
		||||
    }
 | 
			
		||||
    std::fs::rename(temp_archive_path, archive_path)
 | 
			
		||||
        .map_err(|err| format!("Unable to rename: {:?}", err))?;
 | 
			
		||||
 | 
			
		||||
    Ok(())
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
fn initialize_ledger_path(
 | 
			
		||||
    entrypoint: &ContactInfo,
 | 
			
		||||
    ledger_path: &Path,
 | 
			
		||||
    no_snapshot_fetch: bool,
 | 
			
		||||
) -> Result<Hash, String> {
 | 
			
		||||
    let (nodes, _archivers) = discover(
 | 
			
		||||
        &entrypoint.gossip,
 | 
			
		||||
        Some(1),
 | 
			
		||||
        Some(60),
 | 
			
		||||
        None,
 | 
			
		||||
        Some(entrypoint.gossip.ip()),
 | 
			
		||||
        None,
 | 
			
		||||
    )
 | 
			
		||||
    .map_err(|err| err.to_string())?;
 | 
			
		||||
 | 
			
		||||
    let rpc_addr = nodes
 | 
			
		||||
        .iter()
 | 
			
		||||
        .filter_map(ContactInfo::valid_client_facing_addr)
 | 
			
		||||
        .map(|addrs| addrs.0)
 | 
			
		||||
        .find(|rpc_addr| rpc_addr.ip() == entrypoint.gossip.ip())
 | 
			
		||||
        .unwrap_or_else(|| {
 | 
			
		||||
            error!(
 | 
			
		||||
                "Entrypoint ({:?}) is not running the RPC service",
 | 
			
		||||
                entrypoint.gossip.ip()
 | 
			
		||||
            );
 | 
			
		||||
            exit(1);
 | 
			
		||||
        });
 | 
			
		||||
 | 
			
		||||
    let client = RpcClient::new_socket(rpc_addr);
 | 
			
		||||
    let genesis_blockhash = client
 | 
			
		||||
        .get_genesis_blockhash()
 | 
			
		||||
        .map_err(|err| err.to_string())?;
 | 
			
		||||
 | 
			
		||||
    fs::create_dir_all(ledger_path).map_err(|err| err.to_string())?;
 | 
			
		||||
 | 
			
		||||
    download_tar_bz2(&rpc_addr, "genesis.tar.bz2", ledger_path, true)?;
 | 
			
		||||
 | 
			
		||||
    if !no_snapshot_fetch {
 | 
			
		||||
        let snapshot_package = solana_ledger::snapshot_utils::get_snapshot_tar_path(ledger_path);
 | 
			
		||||
        if snapshot_package.exists() {
 | 
			
		||||
            fs::remove_file(&snapshot_package)
 | 
			
		||||
                .unwrap_or_else(|err| warn!("error removing {:?}: {}", snapshot_package, err));
 | 
			
		||||
        }
 | 
			
		||||
        download_tar_bz2(
 | 
			
		||||
            &rpc_addr,
 | 
			
		||||
            snapshot_package.file_name().unwrap().to_str().unwrap(),
 | 
			
		||||
            snapshot_package.parent().unwrap(),
 | 
			
		||||
            false,
 | 
			
		||||
        )
 | 
			
		||||
        .unwrap_or_else(|err| warn!("Unable to fetch snapshot: {:?}", err));
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    match client.get_slot() {
 | 
			
		||||
        Ok(slot) => info!("Entrypoint currently at slot {}", slot),
 | 
			
		||||
        Err(err) => warn!("Failed to get_slot from entrypoint: {}", err),
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    Ok(genesis_blockhash)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Return an error if a keypair file cannot be parsed.
 | 
			
		||||
fn is_keypair(string: String) -> Result<(), String> {
 | 
			
		||||
    read_keypair_file(&string)
 | 
			
		||||
        .map(|_| ())
 | 
			
		||||
        .map_err(|err| format!("{:?}", err))
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
pub fn main() {
 | 
			
		||||
    solana_logger::setup_with_filter("solana=info");
 | 
			
		||||
    solana_metrics::set_panic_hook("validator");
 | 
			
		||||
 | 
			
		||||
    let default_dynamic_port_range =
 | 
			
		||||
        &format!("{}-{}", VALIDATOR_PORT_RANGE.0, VALIDATOR_PORT_RANGE.1);
 | 
			
		||||
 | 
			
		||||
    let matches = App::new(crate_name!()).about(crate_description!())
 | 
			
		||||
        .version(crate_version!())
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("blockstream_unix_socket")
 | 
			
		||||
                .long("blockstream")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .value_name("UNIX DOMAIN SOCKET")
 | 
			
		||||
                .help("Stream entries to this unix domain socket path")
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("identity")
 | 
			
		||||
                .short("i")
 | 
			
		||||
                .long("identity")
 | 
			
		||||
                .value_name("PATH")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .validator(is_keypair)
 | 
			
		||||
                .help("File containing the identity keypair for the validator"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("voting_keypair")
 | 
			
		||||
                .long("voting-keypair")
 | 
			
		||||
                .value_name("PATH")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .validator(is_keypair)
 | 
			
		||||
                .help("File containing the authorized voting keypair.  Default is an ephemeral keypair"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("vote_account")
 | 
			
		||||
                .long("vote-account")
 | 
			
		||||
                .value_name("PUBKEY")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .validator(is_keypair)
 | 
			
		||||
                .help("Public key of the vote account to vote with.  Default is the public key of the voting keypair"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("storage_keypair")
 | 
			
		||||
                .long("storage-keypair")
 | 
			
		||||
                .value_name("PATH")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .validator(is_keypair)
 | 
			
		||||
                .help("File containing the storage account keypair.  Default is an ephemeral keypair"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("init_complete_file")
 | 
			
		||||
                .long("init-complete-file")
 | 
			
		||||
                .value_name("FILE")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .help("Create this file, if it doesn't already exist, once node initialization is complete"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("ledger_path")
 | 
			
		||||
                .short("l")
 | 
			
		||||
                .long("ledger")
 | 
			
		||||
                .value_name("DIR")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .required(true)
 | 
			
		||||
                .help("Use DIR as persistent ledger location"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("entrypoint")
 | 
			
		||||
                .short("n")
 | 
			
		||||
                .long("entrypoint")
 | 
			
		||||
                .value_name("HOST:PORT")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .validator(solana_netutil::is_host_port)
 | 
			
		||||
                .help("Rendezvous with the cluster at this entry point"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("no_snapshot_fetch")
 | 
			
		||||
                .long("no-snapshot-fetch")
 | 
			
		||||
                .takes_value(false)
 | 
			
		||||
                .requires("entrypoint")
 | 
			
		||||
                .help("Do not attempt to fetch a new snapshot from the cluster entrypoint, start from a local snapshot if present"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("no_voting")
 | 
			
		||||
                .long("no-voting")
 | 
			
		||||
                .takes_value(false)
 | 
			
		||||
                .help("Launch node without voting"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("dev_no_sigverify")
 | 
			
		||||
                .long("dev-no-sigverify")
 | 
			
		||||
                .takes_value(false)
 | 
			
		||||
                .help("Run without signature verification"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("dev_halt_at_slot")
 | 
			
		||||
                .long("dev-halt-at-slot")
 | 
			
		||||
                .value_name("SLOT")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .help("Halt the validator when it reaches the given slot"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("rpc_port")
 | 
			
		||||
                .long("rpc-port")
 | 
			
		||||
                .value_name("PORT")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .help("RPC port to use for this node"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("enable_rpc_exit")
 | 
			
		||||
                .long("enable-rpc-exit")
 | 
			
		||||
                .takes_value(false)
 | 
			
		||||
                .help("Enable the JSON RPC 'validatorExit' API.  Only enable in a debug environment"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("rpc_drone_addr")
 | 
			
		||||
                .long("rpc-drone-address")
 | 
			
		||||
                .value_name("HOST:PORT")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .validator(solana_netutil::is_host_port)
 | 
			
		||||
                .help("Enable the JSON RPC 'requestAirdrop' API with this drone address."),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("signer_addr")
 | 
			
		||||
                .long("vote-signer-address")
 | 
			
		||||
                .value_name("HOST:PORT")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .hidden(true) // Don't document this argument to discourage its use
 | 
			
		||||
                .validator(solana_netutil::is_host_port)
 | 
			
		||||
                .help("Rendezvous with the vote signer at this RPC end point"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("account_paths")
 | 
			
		||||
                .long("accounts")
 | 
			
		||||
                .value_name("PATHS")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .help("Comma separated persistent accounts location"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            clap::Arg::with_name("gossip_port")
 | 
			
		||||
                .long("gossip-port")
 | 
			
		||||
                .value_name("HOST:PORT")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .help("Gossip port number for the node"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            clap::Arg::with_name("dynamic_port_range")
 | 
			
		||||
                .long("dynamic-port-range")
 | 
			
		||||
                .value_name("MIN_PORT-MAX_PORT")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .default_value(default_dynamic_port_range)
 | 
			
		||||
                .validator(port_range_validator)
 | 
			
		||||
                .help("Range to use for dynamically assigned ports"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            clap::Arg::with_name("snapshot_interval_slots")
 | 
			
		||||
                .long("snapshot-interval-slots")
 | 
			
		||||
                .value_name("SNAPSHOT_INTERVAL_SLOTS")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .default_value("100")
 | 
			
		||||
                .help("Number of slots between generating snapshots, 0 to disable snapshots"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            clap::Arg::with_name("limit_ledger_size")
 | 
			
		||||
                .long("limit-ledger-size")
 | 
			
		||||
                .takes_value(false)
 | 
			
		||||
                .help("drop older slots in the ledger"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            clap::Arg::with_name("skip_ledger_verify")
 | 
			
		||||
                .long("skip-ledger-verify")
 | 
			
		||||
                .takes_value(false)
 | 
			
		||||
                .help("Skip ledger verification at node bootup"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            clap::Arg::with_name("cuda")
 | 
			
		||||
                .long("cuda")
 | 
			
		||||
                .takes_value(false)
 | 
			
		||||
                .help("Use CUDA"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("expected_genesis_blockhash")
 | 
			
		||||
                .long("expected-genesis-blockhash")
 | 
			
		||||
                .value_name("HASH")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .validator(hash_validator)
 | 
			
		||||
                .help("Require the genesis block have this blockhash"),
 | 
			
		||||
        )
 | 
			
		||||
        .get_matches();
 | 
			
		||||
 | 
			
		||||
    if matches.is_present("cuda") {
 | 
			
		||||
        solana_ledger::perf_libs::init_cuda();
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    let mut validator_config = ValidatorConfig::default();
 | 
			
		||||
    let keypair = if let Some(identity) = matches.value_of("identity") {
 | 
			
		||||
        read_keypair_file(identity).unwrap_or_else(|err| {
 | 
			
		||||
            error!("{}: Unable to open keypair file: {}", err, identity);
 | 
			
		||||
            exit(1);
 | 
			
		||||
        })
 | 
			
		||||
    } else {
 | 
			
		||||
        Keypair::new()
 | 
			
		||||
    };
 | 
			
		||||
 | 
			
		||||
    let voting_keypair = if let Some(identity) = matches.value_of("voting_keypair") {
 | 
			
		||||
        read_keypair_file(identity).unwrap_or_else(|err| {
 | 
			
		||||
            error!("{}: Unable to open keypair file: {}", err, identity);
 | 
			
		||||
            exit(1);
 | 
			
		||||
        })
 | 
			
		||||
    } else {
 | 
			
		||||
        Keypair::new()
 | 
			
		||||
    };
 | 
			
		||||
    let storage_keypair = if let Some(storage_keypair) = matches.value_of("storage_keypair") {
 | 
			
		||||
        read_keypair_file(storage_keypair).unwrap_or_else(|err| {
 | 
			
		||||
            error!("{}: Unable to open keypair file: {}", err, storage_keypair);
 | 
			
		||||
            exit(1);
 | 
			
		||||
        })
 | 
			
		||||
    } else {
 | 
			
		||||
        Keypair::new()
 | 
			
		||||
    };
 | 
			
		||||
 | 
			
		||||
    let vote_account = matches
 | 
			
		||||
        .value_of("vote_account")
 | 
			
		||||
        .map_or(voting_keypair.pubkey(), |pubkey| {
 | 
			
		||||
            pubkey.parse().expect("failed to parse vote_account")
 | 
			
		||||
        });
 | 
			
		||||
 | 
			
		||||
    let ledger_path = PathBuf::from(matches.value_of("ledger_path").unwrap());
 | 
			
		||||
 | 
			
		||||
    validator_config.dev_sigverify_disabled = matches.is_present("dev_no_sigverify");
 | 
			
		||||
    validator_config.dev_halt_at_slot = value_t!(matches, "dev_halt_at_slot", Slot).ok();
 | 
			
		||||
 | 
			
		||||
    validator_config.voting_disabled = matches.is_present("no_voting");
 | 
			
		||||
 | 
			
		||||
    validator_config.rpc_config.enable_validator_exit = matches.is_present("enable_rpc_exit");
 | 
			
		||||
 | 
			
		||||
    validator_config.rpc_config.drone_addr = matches.value_of("rpc_drone_addr").map(|address| {
 | 
			
		||||
        solana_netutil::parse_host_port(address).expect("failed to parse drone address")
 | 
			
		||||
    });
 | 
			
		||||
 | 
			
		||||
    let dynamic_port_range =
 | 
			
		||||
        solana_netutil::parse_port_range(matches.value_of("dynamic_port_range").unwrap())
 | 
			
		||||
            .expect("invalid dynamic_port_range");
 | 
			
		||||
 | 
			
		||||
    let mut gossip_addr = solana_netutil::parse_port_or_addr(
 | 
			
		||||
        matches.value_of("gossip_port"),
 | 
			
		||||
        socketaddr!(
 | 
			
		||||
            [127, 0, 0, 1],
 | 
			
		||||
            solana_netutil::find_available_port_in_range(dynamic_port_range)
 | 
			
		||||
                .expect("unable to find an available gossip port")
 | 
			
		||||
        ),
 | 
			
		||||
    );
 | 
			
		||||
 | 
			
		||||
    if let Some(account_paths) = matches.value_of("account_paths") {
 | 
			
		||||
        validator_config.account_paths = Some(account_paths.to_string());
 | 
			
		||||
    } else {
 | 
			
		||||
        validator_config.account_paths =
 | 
			
		||||
            Some(ledger_path.join("accounts").to_str().unwrap().to_string());
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    let snapshot_interval_slots = value_t_or_exit!(matches, "snapshot_interval_slots", usize);
 | 
			
		||||
    let snapshot_path = ledger_path.clone().join("snapshot");
 | 
			
		||||
    fs::create_dir_all(&snapshot_path).unwrap_or_else(|err| {
 | 
			
		||||
        error!(
 | 
			
		||||
            "Failed to create snapshots directory {:?}: {}",
 | 
			
		||||
            snapshot_path, err
 | 
			
		||||
        );
 | 
			
		||||
        exit(1);
 | 
			
		||||
    });
 | 
			
		||||
 | 
			
		||||
    validator_config.snapshot_config = Some(SnapshotConfig {
 | 
			
		||||
        snapshot_interval_slots: if snapshot_interval_slots > 0 {
 | 
			
		||||
            snapshot_interval_slots
 | 
			
		||||
        } else {
 | 
			
		||||
            std::usize::MAX
 | 
			
		||||
        },
 | 
			
		||||
        snapshot_path,
 | 
			
		||||
        snapshot_package_output_path: ledger_path.clone(),
 | 
			
		||||
    });
 | 
			
		||||
 | 
			
		||||
    if matches.is_present("limit_ledger_size") {
 | 
			
		||||
        validator_config.max_ledger_slots = Some(DEFAULT_MAX_LEDGER_SLOTS);
 | 
			
		||||
    }
 | 
			
		||||
    let cluster_entrypoint = matches.value_of("entrypoint").map(|entrypoint| {
 | 
			
		||||
        let entrypoint_addr = solana_netutil::parse_host_port(entrypoint)
 | 
			
		||||
            .expect("failed to parse entrypoint address");
 | 
			
		||||
        let ip_addr = solana_netutil::get_public_ip_addr(&entrypoint_addr).unwrap_or_else(|err| {
 | 
			
		||||
            error!(
 | 
			
		||||
                "Failed to contact cluster entrypoint {} ({}): {}",
 | 
			
		||||
                entrypoint, entrypoint_addr, err
 | 
			
		||||
            );
 | 
			
		||||
            exit(1);
 | 
			
		||||
        });
 | 
			
		||||
        gossip_addr.set_ip(ip_addr);
 | 
			
		||||
 | 
			
		||||
        ContactInfo::new_gossip_entry_point(&entrypoint_addr)
 | 
			
		||||
    });
 | 
			
		||||
 | 
			
		||||
    if matches.value_of("signer_addr").is_some() {
 | 
			
		||||
        warn!("--vote-signer-address ignored");
 | 
			
		||||
        /*
 | 
			
		||||
        let (_signer_service, _signer_addr) = if let Some(signer_addr) = matches.value_of("signer_addr")
 | 
			
		||||
        {
 | 
			
		||||
            (
 | 
			
		||||
                None,
 | 
			
		||||
                signer_addr.to_string().parse().expect("Signer IP Address"),
 | 
			
		||||
            )
 | 
			
		||||
        } else {
 | 
			
		||||
            // Run a local vote signer if a vote signer service address was not provided
 | 
			
		||||
            let (signer_service, signer_addr) = solana_core::local_vote_signer_service::LocalVoteSignerService::new(dynamic_port_range);
 | 
			
		||||
            (Some(signer_service), signer_addr)
 | 
			
		||||
        };
 | 
			
		||||
        */
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    let init_complete_file = matches.value_of("init_complete_file");
 | 
			
		||||
    let verify_ledger = !matches.is_present("skip_ledger_verify");
 | 
			
		||||
    validator_config.blockstream_unix_socket = matches
 | 
			
		||||
        .value_of("blockstream_unix_socket")
 | 
			
		||||
        .map(PathBuf::from);
 | 
			
		||||
 | 
			
		||||
    println!(
 | 
			
		||||
        "{} version {} (branch={}, commit={})",
 | 
			
		||||
        style(crate_name!()).bold(),
 | 
			
		||||
        crate_version!(),
 | 
			
		||||
        option_env!("CI_BRANCH").unwrap_or("unknown"),
 | 
			
		||||
        option_env!("CI_COMMIT").unwrap_or("unknown")
 | 
			
		||||
    );
 | 
			
		||||
    solana_metrics::set_host_id(keypair.pubkey().to_string());
 | 
			
		||||
 | 
			
		||||
    let mut tcp_ports = vec![];
 | 
			
		||||
    let mut node = Node::new_with_external_ip(&keypair.pubkey(), &gossip_addr, dynamic_port_range);
 | 
			
		||||
    if let Some(port) = matches.value_of("rpc_port") {
 | 
			
		||||
        let port_number = port.to_string().parse().expect("integer");
 | 
			
		||||
        if port_number == 0 {
 | 
			
		||||
            error!("Invalid RPC port requested: {:?}", port);
 | 
			
		||||
            exit(1);
 | 
			
		||||
        }
 | 
			
		||||
        node.info.rpc = SocketAddr::new(node.info.gossip.ip(), port_number);
 | 
			
		||||
        node.info.rpc_pubsub = SocketAddr::new(node.info.gossip.ip(), port_number + 1);
 | 
			
		||||
        tcp_ports = vec![port_number, port_number + 1];
 | 
			
		||||
    };
 | 
			
		||||
 | 
			
		||||
    validator_config.expected_genesis_blockhash = matches
 | 
			
		||||
        .value_of("expected_genesis_blockhash")
 | 
			
		||||
        .map(|s| Hash::from_str(&s).unwrap());
 | 
			
		||||
 | 
			
		||||
    if let Some(ref cluster_entrypoint) = cluster_entrypoint {
 | 
			
		||||
        let udp_sockets = [
 | 
			
		||||
            &node.sockets.gossip,
 | 
			
		||||
            &node.sockets.broadcast,
 | 
			
		||||
            &node.sockets.repair,
 | 
			
		||||
        ];
 | 
			
		||||
 | 
			
		||||
        let mut tcp_listeners: Vec<(_, _)> = tcp_ports
 | 
			
		||||
            .iter()
 | 
			
		||||
            .map(|port| {
 | 
			
		||||
                (
 | 
			
		||||
                    *port,
 | 
			
		||||
                    TcpListener::bind(&SocketAddr::from(([0, 0, 0, 0], *port))).unwrap_or_else(
 | 
			
		||||
                        |err| {
 | 
			
		||||
                            error!("Unable to bind to tcp/{}: {}", port, err);
 | 
			
		||||
                            std::process::exit(1);
 | 
			
		||||
                        },
 | 
			
		||||
                    ),
 | 
			
		||||
                )
 | 
			
		||||
            })
 | 
			
		||||
            .collect();
 | 
			
		||||
        if let Some(ip_echo) = &node.sockets.ip_echo {
 | 
			
		||||
            let ip_echo = ip_echo.try_clone().expect("unable to clone tcp_listener");
 | 
			
		||||
            tcp_listeners.push((node.info.gossip.port(), ip_echo));
 | 
			
		||||
        }
 | 
			
		||||
        solana_netutil::verify_reachable_ports(
 | 
			
		||||
            &cluster_entrypoint.gossip,
 | 
			
		||||
            tcp_listeners,
 | 
			
		||||
            &udp_sockets,
 | 
			
		||||
        );
 | 
			
		||||
 | 
			
		||||
        let genesis_blockhash = initialize_ledger_path(
 | 
			
		||||
            cluster_entrypoint,
 | 
			
		||||
            &ledger_path,
 | 
			
		||||
            matches.is_present("no_snapshot_fetch"),
 | 
			
		||||
        )
 | 
			
		||||
        .unwrap_or_else(|err| {
 | 
			
		||||
            error!("Failed to download ledger: {}", err);
 | 
			
		||||
            exit(1);
 | 
			
		||||
        });
 | 
			
		||||
 | 
			
		||||
        if let Some(expected_genesis_blockhash) = validator_config.expected_genesis_blockhash {
 | 
			
		||||
            if expected_genesis_blockhash != genesis_blockhash {
 | 
			
		||||
                error!(
 | 
			
		||||
                    "Genesis blockhash mismatch: expected {} but local genesis blockhash is {}",
 | 
			
		||||
                    expected_genesis_blockhash, genesis_blockhash,
 | 
			
		||||
                );
 | 
			
		||||
                exit(1);
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
        validator_config.expected_genesis_blockhash = Some(genesis_blockhash);
 | 
			
		||||
    } else {
 | 
			
		||||
        // Without a cluster entrypoint, ledger_path must already be present
 | 
			
		||||
        if !ledger_path.is_dir() {
 | 
			
		||||
            error!(
 | 
			
		||||
                "ledger directory does not exist or is not accessible: {:?}",
 | 
			
		||||
                ledger_path
 | 
			
		||||
            );
 | 
			
		||||
            exit(1);
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    let validator = Validator::new(
 | 
			
		||||
        node,
 | 
			
		||||
        &Arc::new(keypair),
 | 
			
		||||
        &ledger_path,
 | 
			
		||||
        &vote_account,
 | 
			
		||||
        &Arc::new(voting_keypair),
 | 
			
		||||
        &Arc::new(storage_keypair),
 | 
			
		||||
        cluster_entrypoint.as_ref(),
 | 
			
		||||
        verify_ledger,
 | 
			
		||||
        &validator_config,
 | 
			
		||||
    );
 | 
			
		||||
 | 
			
		||||
    if let Some(filename) = init_complete_file {
 | 
			
		||||
        File::create(filename).unwrap_or_else(|_| {
 | 
			
		||||
            error!("Unable to create: {}", filename);
 | 
			
		||||
            exit(1);
 | 
			
		||||
        });
 | 
			
		||||
    }
 | 
			
		||||
    info!("Validator initialized");
 | 
			
		||||
    validator.join().expect("validator exit");
 | 
			
		||||
    info!("Validator exiting..");
 | 
			
		||||
}
 | 
			
		||||
@@ -1,3 +1,656 @@
 | 
			
		||||
fn main() {
 | 
			
		||||
    solana_validator::main()
 | 
			
		||||
use bzip2::bufread::BzDecoder;
 | 
			
		||||
use clap::{crate_description, crate_name, crate_version, value_t, value_t_or_exit, App, Arg};
 | 
			
		||||
use console::{style, Emoji};
 | 
			
		||||
use indicatif::{ProgressBar, ProgressStyle};
 | 
			
		||||
use log::*;
 | 
			
		||||
use solana_client::rpc_client::RpcClient;
 | 
			
		||||
use solana_core::cluster_info::{Node, VALIDATOR_PORT_RANGE};
 | 
			
		||||
use solana_core::contact_info::ContactInfo;
 | 
			
		||||
use solana_core::gossip_service::discover;
 | 
			
		||||
use solana_core::ledger_cleanup_service::DEFAULT_MAX_LEDGER_SLOTS;
 | 
			
		||||
use solana_core::service::Service;
 | 
			
		||||
use solana_core::socketaddr;
 | 
			
		||||
use solana_core::validator::{Validator, ValidatorConfig};
 | 
			
		||||
use solana_ledger::bank_forks::SnapshotConfig;
 | 
			
		||||
use solana_sdk::clock::Slot;
 | 
			
		||||
use solana_sdk::hash::Hash;
 | 
			
		||||
use solana_sdk::signature::{read_keypair_file, Keypair, KeypairUtil};
 | 
			
		||||
use std::fs::{self, File};
 | 
			
		||||
use std::io::{self, Read};
 | 
			
		||||
use std::net::{SocketAddr, TcpListener};
 | 
			
		||||
use std::path::{Path, PathBuf};
 | 
			
		||||
use std::process::exit;
 | 
			
		||||
use std::str::FromStr;
 | 
			
		||||
use std::sync::Arc;
 | 
			
		||||
use std::time::Instant;
 | 
			
		||||
 | 
			
		||||
fn port_range_validator(port_range: String) -> Result<(), String> {
 | 
			
		||||
    if solana_netutil::parse_port_range(&port_range).is_some() {
 | 
			
		||||
        Ok(())
 | 
			
		||||
    } else {
 | 
			
		||||
        Err("Invalid port range".to_string())
 | 
			
		||||
    }
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
fn hash_validator(hash: String) -> Result<(), String> {
 | 
			
		||||
    Hash::from_str(&hash)
 | 
			
		||||
        .map(|_| ())
 | 
			
		||||
        .map_err(|e| format!("{:?}", e))
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static TRUCK: Emoji = Emoji("🚚 ", "");
 | 
			
		||||
static SPARKLE: Emoji = Emoji("✨ ", "");
 | 
			
		||||
 | 
			
		||||
/// Creates a new process bar for processing that will take an unknown amount of time
 | 
			
		||||
fn new_spinner_progress_bar() -> ProgressBar {
 | 
			
		||||
    let progress_bar = ProgressBar::new(42);
 | 
			
		||||
    progress_bar
 | 
			
		||||
        .set_style(ProgressStyle::default_spinner().template("{spinner:.green} {wide_msg}"));
 | 
			
		||||
    progress_bar.enable_steady_tick(100);
 | 
			
		||||
    progress_bar
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
fn download_tar_bz2(
 | 
			
		||||
    rpc_addr: &SocketAddr,
 | 
			
		||||
    archive_name: &str,
 | 
			
		||||
    download_path: &Path,
 | 
			
		||||
    extract: bool,
 | 
			
		||||
) -> Result<(), String> {
 | 
			
		||||
    let archive_path = download_path.join(archive_name);
 | 
			
		||||
    if archive_path.is_file() {
 | 
			
		||||
        return Ok(());
 | 
			
		||||
    }
 | 
			
		||||
    let temp_archive_path = {
 | 
			
		||||
        let mut p = archive_path.clone();
 | 
			
		||||
        p.set_extension(".tmp");
 | 
			
		||||
        p
 | 
			
		||||
    };
 | 
			
		||||
 | 
			
		||||
    let url = format!("http://{}/{}", rpc_addr, archive_name);
 | 
			
		||||
    let download_start = Instant::now();
 | 
			
		||||
 | 
			
		||||
    let progress_bar = new_spinner_progress_bar();
 | 
			
		||||
    progress_bar.set_message(&format!("{}Downloading {}...", TRUCK, url));
 | 
			
		||||
 | 
			
		||||
    let client = reqwest::Client::new();
 | 
			
		||||
    let response = client
 | 
			
		||||
        .get(url.as_str())
 | 
			
		||||
        .send()
 | 
			
		||||
        .and_then(|response| response.error_for_status())
 | 
			
		||||
        .map_err(|err| format!("Unable to get: {:?}", err))?;
 | 
			
		||||
    let download_size = {
 | 
			
		||||
        response
 | 
			
		||||
            .headers()
 | 
			
		||||
            .get(reqwest::header::CONTENT_LENGTH)
 | 
			
		||||
            .and_then(|content_length| content_length.to_str().ok())
 | 
			
		||||
            .and_then(|content_length| content_length.parse().ok())
 | 
			
		||||
            .unwrap_or(0)
 | 
			
		||||
    };
 | 
			
		||||
    progress_bar.set_length(download_size);
 | 
			
		||||
    progress_bar.set_style(
 | 
			
		||||
        ProgressStyle::default_bar()
 | 
			
		||||
            .template(&format!(
 | 
			
		||||
                "{}{}Downloading {} {}",
 | 
			
		||||
                "{spinner:.green} ",
 | 
			
		||||
                TRUCK,
 | 
			
		||||
                url,
 | 
			
		||||
                "[{bar:40.cyan/blue}] {bytes}/{total_bytes} ({eta})"
 | 
			
		||||
            ))
 | 
			
		||||
            .progress_chars("=> "),
 | 
			
		||||
    );
 | 
			
		||||
 | 
			
		||||
    struct DownloadProgress<R> {
 | 
			
		||||
        progress_bar: ProgressBar,
 | 
			
		||||
        response: R,
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    impl<R: Read> Read for DownloadProgress<R> {
 | 
			
		||||
        fn read(&mut self, buf: &mut [u8]) -> io::Result<usize> {
 | 
			
		||||
            self.response.read(buf).map(|n| {
 | 
			
		||||
                self.progress_bar.inc(n as u64);
 | 
			
		||||
                n
 | 
			
		||||
            })
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    let mut source = DownloadProgress {
 | 
			
		||||
        progress_bar,
 | 
			
		||||
        response,
 | 
			
		||||
    };
 | 
			
		||||
 | 
			
		||||
    let mut file = File::create(&temp_archive_path)
 | 
			
		||||
        .map_err(|err| format!("Unable to create {:?}: {:?}", temp_archive_path, err))?;
 | 
			
		||||
    std::io::copy(&mut source, &mut file)
 | 
			
		||||
        .map_err(|err| format!("Unable to write {:?}: {:?}", temp_archive_path, err))?;
 | 
			
		||||
 | 
			
		||||
    source.progress_bar.finish_and_clear();
 | 
			
		||||
    println!(
 | 
			
		||||
        "  {}{}",
 | 
			
		||||
        SPARKLE,
 | 
			
		||||
        format!(
 | 
			
		||||
            "Downloaded {} ({} bytes) in {:?}",
 | 
			
		||||
            url,
 | 
			
		||||
            download_size,
 | 
			
		||||
            Instant::now().duration_since(download_start),
 | 
			
		||||
        )
 | 
			
		||||
    );
 | 
			
		||||
 | 
			
		||||
    if extract {
 | 
			
		||||
        println!("Extracting {:?}...", archive_path);
 | 
			
		||||
        let extract_start = Instant::now();
 | 
			
		||||
        let tar_bz2 = File::open(&temp_archive_path)
 | 
			
		||||
            .map_err(|err| format!("Unable to open {}: {:?}", archive_name, err))?;
 | 
			
		||||
        let tar = BzDecoder::new(std::io::BufReader::new(tar_bz2));
 | 
			
		||||
        let mut archive = tar::Archive::new(tar);
 | 
			
		||||
        archive
 | 
			
		||||
            .unpack(download_path)
 | 
			
		||||
            .map_err(|err| format!("Unable to unpack {}: {:?}", archive_name, err))?;
 | 
			
		||||
        println!(
 | 
			
		||||
            "Extracted {} in {:?}",
 | 
			
		||||
            archive_name,
 | 
			
		||||
            Instant::now().duration_since(extract_start)
 | 
			
		||||
        );
 | 
			
		||||
    }
 | 
			
		||||
    std::fs::rename(temp_archive_path, archive_path)
 | 
			
		||||
        .map_err(|err| format!("Unable to rename: {:?}", err))?;
 | 
			
		||||
 | 
			
		||||
    Ok(())
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
fn initialize_ledger_path(
 | 
			
		||||
    entrypoint: &ContactInfo,
 | 
			
		||||
    ledger_path: &Path,
 | 
			
		||||
    no_snapshot_fetch: bool,
 | 
			
		||||
) -> Result<Hash, String> {
 | 
			
		||||
    let (nodes, _archivers) = discover(
 | 
			
		||||
        &entrypoint.gossip,
 | 
			
		||||
        Some(1),
 | 
			
		||||
        Some(60),
 | 
			
		||||
        None,
 | 
			
		||||
        Some(entrypoint.gossip.ip()),
 | 
			
		||||
        None,
 | 
			
		||||
    )
 | 
			
		||||
    .map_err(|err| err.to_string())?;
 | 
			
		||||
 | 
			
		||||
    let rpc_addr = nodes
 | 
			
		||||
        .iter()
 | 
			
		||||
        .filter_map(ContactInfo::valid_client_facing_addr)
 | 
			
		||||
        .map(|addrs| addrs.0)
 | 
			
		||||
        .find(|rpc_addr| rpc_addr.ip() == entrypoint.gossip.ip())
 | 
			
		||||
        .unwrap_or_else(|| {
 | 
			
		||||
            error!(
 | 
			
		||||
                "Entrypoint ({:?}) is not running the RPC service",
 | 
			
		||||
                entrypoint.gossip.ip()
 | 
			
		||||
            );
 | 
			
		||||
            exit(1);
 | 
			
		||||
        });
 | 
			
		||||
 | 
			
		||||
    let client = RpcClient::new_socket(rpc_addr);
 | 
			
		||||
    let genesis_blockhash = client
 | 
			
		||||
        .get_genesis_blockhash()
 | 
			
		||||
        .map_err(|err| err.to_string())?;
 | 
			
		||||
 | 
			
		||||
    fs::create_dir_all(ledger_path).map_err(|err| err.to_string())?;
 | 
			
		||||
 | 
			
		||||
    download_tar_bz2(&rpc_addr, "genesis.tar.bz2", ledger_path, true)?;
 | 
			
		||||
 | 
			
		||||
    if !no_snapshot_fetch {
 | 
			
		||||
        let snapshot_package = solana_ledger::snapshot_utils::get_snapshot_tar_path(ledger_path);
 | 
			
		||||
        if snapshot_package.exists() {
 | 
			
		||||
            fs::remove_file(&snapshot_package)
 | 
			
		||||
                .unwrap_or_else(|err| warn!("error removing {:?}: {}", snapshot_package, err));
 | 
			
		||||
        }
 | 
			
		||||
        download_tar_bz2(
 | 
			
		||||
            &rpc_addr,
 | 
			
		||||
            snapshot_package.file_name().unwrap().to_str().unwrap(),
 | 
			
		||||
            snapshot_package.parent().unwrap(),
 | 
			
		||||
            false,
 | 
			
		||||
        )
 | 
			
		||||
        .unwrap_or_else(|err| warn!("Unable to fetch snapshot: {:?}", err));
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    match client.get_slot() {
 | 
			
		||||
        Ok(slot) => info!("Entrypoint currently at slot {}", slot),
 | 
			
		||||
        Err(err) => warn!("Failed to get_slot from entrypoint: {}", err),
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    Ok(genesis_blockhash)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Return an error if a keypair file cannot be parsed.
 | 
			
		||||
fn is_keypair(string: String) -> Result<(), String> {
 | 
			
		||||
    read_keypair_file(&string)
 | 
			
		||||
        .map(|_| ())
 | 
			
		||||
        .map_err(|err| format!("{:?}", err))
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
pub fn main() {
 | 
			
		||||
    solana_logger::setup_with_filter("solana=info");
 | 
			
		||||
    solana_metrics::set_panic_hook("validator");
 | 
			
		||||
 | 
			
		||||
    let default_dynamic_port_range =
 | 
			
		||||
        &format!("{}-{}", VALIDATOR_PORT_RANGE.0, VALIDATOR_PORT_RANGE.1);
 | 
			
		||||
 | 
			
		||||
    let matches = App::new(crate_name!()).about(crate_description!())
 | 
			
		||||
        .version(crate_version!())
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("blockstream_unix_socket")
 | 
			
		||||
                .long("blockstream")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .value_name("UNIX DOMAIN SOCKET")
 | 
			
		||||
                .help("Stream entries to this unix domain socket path")
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("identity")
 | 
			
		||||
                .short("i")
 | 
			
		||||
                .long("identity")
 | 
			
		||||
                .value_name("PATH")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .validator(is_keypair)
 | 
			
		||||
                .help("File containing the identity keypair for the validator"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("voting_keypair")
 | 
			
		||||
                .long("voting-keypair")
 | 
			
		||||
                .value_name("PATH")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .validator(is_keypair)
 | 
			
		||||
                .help("File containing the authorized voting keypair.  Default is an ephemeral keypair"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("vote_account")
 | 
			
		||||
                .long("vote-account")
 | 
			
		||||
                .value_name("PUBKEY")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .validator(is_keypair)
 | 
			
		||||
                .help("Public key of the vote account to vote with.  Default is the public key of the voting keypair"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("storage_keypair")
 | 
			
		||||
                .long("storage-keypair")
 | 
			
		||||
                .value_name("PATH")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .validator(is_keypair)
 | 
			
		||||
                .help("File containing the storage account keypair.  Default is an ephemeral keypair"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("init_complete_file")
 | 
			
		||||
                .long("init-complete-file")
 | 
			
		||||
                .value_name("FILE")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .help("Create this file, if it doesn't already exist, once node initialization is complete"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("ledger_path")
 | 
			
		||||
                .short("l")
 | 
			
		||||
                .long("ledger")
 | 
			
		||||
                .value_name("DIR")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .required(true)
 | 
			
		||||
                .help("Use DIR as persistent ledger location"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("entrypoint")
 | 
			
		||||
                .short("n")
 | 
			
		||||
                .long("entrypoint")
 | 
			
		||||
                .value_name("HOST:PORT")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .validator(solana_netutil::is_host_port)
 | 
			
		||||
                .help("Rendezvous with the cluster at this entry point"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("no_snapshot_fetch")
 | 
			
		||||
                .long("no-snapshot-fetch")
 | 
			
		||||
                .takes_value(false)
 | 
			
		||||
                .requires("entrypoint")
 | 
			
		||||
                .help("Do not attempt to fetch a new snapshot from the cluster entrypoint, start from a local snapshot if present"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("no_voting")
 | 
			
		||||
                .long("no-voting")
 | 
			
		||||
                .takes_value(false)
 | 
			
		||||
                .help("Launch node without voting"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("dev_no_sigverify")
 | 
			
		||||
                .long("dev-no-sigverify")
 | 
			
		||||
                .takes_value(false)
 | 
			
		||||
                .help("Run without signature verification"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("dev_halt_at_slot")
 | 
			
		||||
                .long("dev-halt-at-slot")
 | 
			
		||||
                .value_name("SLOT")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .help("Halt the validator when it reaches the given slot"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("rpc_port")
 | 
			
		||||
                .long("rpc-port")
 | 
			
		||||
                .value_name("PORT")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .help("RPC port to use for this node"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("enable_rpc_exit")
 | 
			
		||||
                .long("enable-rpc-exit")
 | 
			
		||||
                .takes_value(false)
 | 
			
		||||
                .help("Enable the JSON RPC 'validatorExit' API.  Only enable in a debug environment"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("rpc_drone_addr")
 | 
			
		||||
                .long("rpc-drone-address")
 | 
			
		||||
                .value_name("HOST:PORT")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .validator(solana_netutil::is_host_port)
 | 
			
		||||
                .help("Enable the JSON RPC 'requestAirdrop' API with this drone address."),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("signer_addr")
 | 
			
		||||
                .long("vote-signer-address")
 | 
			
		||||
                .value_name("HOST:PORT")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .hidden(true) // Don't document this argument to discourage its use
 | 
			
		||||
                .validator(solana_netutil::is_host_port)
 | 
			
		||||
                .help("Rendezvous with the vote signer at this RPC end point"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("account_paths")
 | 
			
		||||
                .long("accounts")
 | 
			
		||||
                .value_name("PATHS")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .help("Comma separated persistent accounts location"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            clap::Arg::with_name("gossip_port")
 | 
			
		||||
                .long("gossip-port")
 | 
			
		||||
                .value_name("HOST:PORT")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .help("Gossip port number for the node"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            clap::Arg::with_name("dynamic_port_range")
 | 
			
		||||
                .long("dynamic-port-range")
 | 
			
		||||
                .value_name("MIN_PORT-MAX_PORT")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .default_value(default_dynamic_port_range)
 | 
			
		||||
                .validator(port_range_validator)
 | 
			
		||||
                .help("Range to use for dynamically assigned ports"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            clap::Arg::with_name("snapshot_interval_slots")
 | 
			
		||||
                .long("snapshot-interval-slots")
 | 
			
		||||
                .value_name("SNAPSHOT_INTERVAL_SLOTS")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .default_value("100")
 | 
			
		||||
                .help("Number of slots between generating snapshots, 0 to disable snapshots"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            clap::Arg::with_name("limit_ledger_size")
 | 
			
		||||
                .long("limit-ledger-size")
 | 
			
		||||
                .takes_value(false)
 | 
			
		||||
                .help("drop older slots in the ledger"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            clap::Arg::with_name("skip_ledger_verify")
 | 
			
		||||
                .long("skip-ledger-verify")
 | 
			
		||||
                .takes_value(false)
 | 
			
		||||
                .help("Skip ledger verification at node bootup"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            clap::Arg::with_name("cuda")
 | 
			
		||||
                .long("cuda")
 | 
			
		||||
                .takes_value(false)
 | 
			
		||||
                .help("Use CUDA"),
 | 
			
		||||
        )
 | 
			
		||||
        .arg(
 | 
			
		||||
            Arg::with_name("expected_genesis_blockhash")
 | 
			
		||||
                .long("expected-genesis-blockhash")
 | 
			
		||||
                .value_name("HASH")
 | 
			
		||||
                .takes_value(true)
 | 
			
		||||
                .validator(hash_validator)
 | 
			
		||||
                .help("Require the genesis block have this blockhash"),
 | 
			
		||||
        )
 | 
			
		||||
        .get_matches();
 | 
			
		||||
 | 
			
		||||
    if matches.is_present("cuda") {
 | 
			
		||||
        solana_ledger::perf_libs::init_cuda();
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    let mut validator_config = ValidatorConfig::default();
 | 
			
		||||
    let keypair = if let Some(identity) = matches.value_of("identity") {
 | 
			
		||||
        read_keypair_file(identity).unwrap_or_else(|err| {
 | 
			
		||||
            error!("{}: Unable to open keypair file: {}", err, identity);
 | 
			
		||||
            exit(1);
 | 
			
		||||
        })
 | 
			
		||||
    } else {
 | 
			
		||||
        Keypair::new()
 | 
			
		||||
    };
 | 
			
		||||
 | 
			
		||||
    let voting_keypair = if let Some(identity) = matches.value_of("voting_keypair") {
 | 
			
		||||
        read_keypair_file(identity).unwrap_or_else(|err| {
 | 
			
		||||
            error!("{}: Unable to open keypair file: {}", err, identity);
 | 
			
		||||
            exit(1);
 | 
			
		||||
        })
 | 
			
		||||
    } else {
 | 
			
		||||
        Keypair::new()
 | 
			
		||||
    };
 | 
			
		||||
    let storage_keypair = if let Some(storage_keypair) = matches.value_of("storage_keypair") {
 | 
			
		||||
        read_keypair_file(storage_keypair).unwrap_or_else(|err| {
 | 
			
		||||
            error!("{}: Unable to open keypair file: {}", err, storage_keypair);
 | 
			
		||||
            exit(1);
 | 
			
		||||
        })
 | 
			
		||||
    } else {
 | 
			
		||||
        Keypair::new()
 | 
			
		||||
    };
 | 
			
		||||
 | 
			
		||||
    let vote_account = matches
 | 
			
		||||
        .value_of("vote_account")
 | 
			
		||||
        .map_or(voting_keypair.pubkey(), |pubkey| {
 | 
			
		||||
            pubkey.parse().expect("failed to parse vote_account")
 | 
			
		||||
        });
 | 
			
		||||
 | 
			
		||||
    let ledger_path = PathBuf::from(matches.value_of("ledger_path").unwrap());
 | 
			
		||||
 | 
			
		||||
    validator_config.dev_sigverify_disabled = matches.is_present("dev_no_sigverify");
 | 
			
		||||
    validator_config.dev_halt_at_slot = value_t!(matches, "dev_halt_at_slot", Slot).ok();
 | 
			
		||||
 | 
			
		||||
    validator_config.voting_disabled = matches.is_present("no_voting");
 | 
			
		||||
 | 
			
		||||
    validator_config.rpc_config.enable_validator_exit = matches.is_present("enable_rpc_exit");
 | 
			
		||||
 | 
			
		||||
    validator_config.rpc_config.drone_addr = matches.value_of("rpc_drone_addr").map(|address| {
 | 
			
		||||
        solana_netutil::parse_host_port(address).expect("failed to parse drone address")
 | 
			
		||||
    });
 | 
			
		||||
 | 
			
		||||
    let dynamic_port_range =
 | 
			
		||||
        solana_netutil::parse_port_range(matches.value_of("dynamic_port_range").unwrap())
 | 
			
		||||
            .expect("invalid dynamic_port_range");
 | 
			
		||||
 | 
			
		||||
    let mut gossip_addr = solana_netutil::parse_port_or_addr(
 | 
			
		||||
        matches.value_of("gossip_port"),
 | 
			
		||||
        socketaddr!(
 | 
			
		||||
            [127, 0, 0, 1],
 | 
			
		||||
            solana_netutil::find_available_port_in_range(dynamic_port_range)
 | 
			
		||||
                .expect("unable to find an available gossip port")
 | 
			
		||||
        ),
 | 
			
		||||
    );
 | 
			
		||||
 | 
			
		||||
    if let Some(account_paths) = matches.value_of("account_paths") {
 | 
			
		||||
        validator_config.account_paths = Some(account_paths.to_string());
 | 
			
		||||
    } else {
 | 
			
		||||
        validator_config.account_paths =
 | 
			
		||||
            Some(ledger_path.join("accounts").to_str().unwrap().to_string());
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    let snapshot_interval_slots = value_t_or_exit!(matches, "snapshot_interval_slots", usize);
 | 
			
		||||
    let snapshot_path = ledger_path.clone().join("snapshot");
 | 
			
		||||
    fs::create_dir_all(&snapshot_path).unwrap_or_else(|err| {
 | 
			
		||||
        error!(
 | 
			
		||||
            "Failed to create snapshots directory {:?}: {}",
 | 
			
		||||
            snapshot_path, err
 | 
			
		||||
        );
 | 
			
		||||
        exit(1);
 | 
			
		||||
    });
 | 
			
		||||
 | 
			
		||||
    validator_config.snapshot_config = Some(SnapshotConfig {
 | 
			
		||||
        snapshot_interval_slots: if snapshot_interval_slots > 0 {
 | 
			
		||||
            snapshot_interval_slots
 | 
			
		||||
        } else {
 | 
			
		||||
            std::usize::MAX
 | 
			
		||||
        },
 | 
			
		||||
        snapshot_path,
 | 
			
		||||
        snapshot_package_output_path: ledger_path.clone(),
 | 
			
		||||
    });
 | 
			
		||||
 | 
			
		||||
    if matches.is_present("limit_ledger_size") {
 | 
			
		||||
        validator_config.max_ledger_slots = Some(DEFAULT_MAX_LEDGER_SLOTS);
 | 
			
		||||
    }
 | 
			
		||||
    let cluster_entrypoint = matches.value_of("entrypoint").map(|entrypoint| {
 | 
			
		||||
        let entrypoint_addr = solana_netutil::parse_host_port(entrypoint)
 | 
			
		||||
            .expect("failed to parse entrypoint address");
 | 
			
		||||
        let ip_addr = solana_netutil::get_public_ip_addr(&entrypoint_addr).unwrap_or_else(|err| {
 | 
			
		||||
            error!(
 | 
			
		||||
                "Failed to contact cluster entrypoint {} ({}): {}",
 | 
			
		||||
                entrypoint, entrypoint_addr, err
 | 
			
		||||
            );
 | 
			
		||||
            exit(1);
 | 
			
		||||
        });
 | 
			
		||||
        gossip_addr.set_ip(ip_addr);
 | 
			
		||||
 | 
			
		||||
        ContactInfo::new_gossip_entry_point(&entrypoint_addr)
 | 
			
		||||
    });
 | 
			
		||||
 | 
			
		||||
    if matches.value_of("signer_addr").is_some() {
 | 
			
		||||
        warn!("--vote-signer-address ignored");
 | 
			
		||||
        /*
 | 
			
		||||
        let (_signer_service, _signer_addr) = if let Some(signer_addr) = matches.value_of("signer_addr")
 | 
			
		||||
        {
 | 
			
		||||
            (
 | 
			
		||||
                None,
 | 
			
		||||
                signer_addr.to_string().parse().expect("Signer IP Address"),
 | 
			
		||||
            )
 | 
			
		||||
        } else {
 | 
			
		||||
            // Run a local vote signer if a vote signer service address was not provided
 | 
			
		||||
            let (signer_service, signer_addr) = solana_core::local_vote_signer_service::LocalVoteSignerService::new(dynamic_port_range);
 | 
			
		||||
            (Some(signer_service), signer_addr)
 | 
			
		||||
        };
 | 
			
		||||
        */
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    let init_complete_file = matches.value_of("init_complete_file");
 | 
			
		||||
    let verify_ledger = !matches.is_present("skip_ledger_verify");
 | 
			
		||||
    validator_config.blockstream_unix_socket = matches
 | 
			
		||||
        .value_of("blockstream_unix_socket")
 | 
			
		||||
        .map(PathBuf::from);
 | 
			
		||||
 | 
			
		||||
    println!(
 | 
			
		||||
        "{} version {} (branch={}, commit={})",
 | 
			
		||||
        style(crate_name!()).bold(),
 | 
			
		||||
        crate_version!(),
 | 
			
		||||
        option_env!("CI_BRANCH").unwrap_or("unknown"),
 | 
			
		||||
        option_env!("CI_COMMIT").unwrap_or("unknown")
 | 
			
		||||
    );
 | 
			
		||||
    solana_metrics::set_host_id(keypair.pubkey().to_string());
 | 
			
		||||
 | 
			
		||||
    let mut tcp_ports = vec![];
 | 
			
		||||
    let mut node = Node::new_with_external_ip(&keypair.pubkey(), &gossip_addr, dynamic_port_range);
 | 
			
		||||
    if let Some(port) = matches.value_of("rpc_port") {
 | 
			
		||||
        let port_number = port.to_string().parse().expect("integer");
 | 
			
		||||
        if port_number == 0 {
 | 
			
		||||
            error!("Invalid RPC port requested: {:?}", port);
 | 
			
		||||
            exit(1);
 | 
			
		||||
        }
 | 
			
		||||
        node.info.rpc = SocketAddr::new(node.info.gossip.ip(), port_number);
 | 
			
		||||
        node.info.rpc_pubsub = SocketAddr::new(node.info.gossip.ip(), port_number + 1);
 | 
			
		||||
        tcp_ports = vec![port_number, port_number + 1];
 | 
			
		||||
    };
 | 
			
		||||
 | 
			
		||||
    validator_config.expected_genesis_blockhash = matches
 | 
			
		||||
        .value_of("expected_genesis_blockhash")
 | 
			
		||||
        .map(|s| Hash::from_str(&s).unwrap());
 | 
			
		||||
 | 
			
		||||
    if let Some(ref cluster_entrypoint) = cluster_entrypoint {
 | 
			
		||||
        let udp_sockets = [
 | 
			
		||||
            &node.sockets.gossip,
 | 
			
		||||
            &node.sockets.broadcast,
 | 
			
		||||
            &node.sockets.repair,
 | 
			
		||||
        ];
 | 
			
		||||
 | 
			
		||||
        let mut tcp_listeners: Vec<(_, _)> = tcp_ports
 | 
			
		||||
            .iter()
 | 
			
		||||
            .map(|port| {
 | 
			
		||||
                (
 | 
			
		||||
                    *port,
 | 
			
		||||
                    TcpListener::bind(&SocketAddr::from(([0, 0, 0, 0], *port))).unwrap_or_else(
 | 
			
		||||
                        |err| {
 | 
			
		||||
                            error!("Unable to bind to tcp/{}: {}", port, err);
 | 
			
		||||
                            std::process::exit(1);
 | 
			
		||||
                        },
 | 
			
		||||
                    ),
 | 
			
		||||
                )
 | 
			
		||||
            })
 | 
			
		||||
            .collect();
 | 
			
		||||
        if let Some(ip_echo) = &node.sockets.ip_echo {
 | 
			
		||||
            let ip_echo = ip_echo.try_clone().expect("unable to clone tcp_listener");
 | 
			
		||||
            tcp_listeners.push((node.info.gossip.port(), ip_echo));
 | 
			
		||||
        }
 | 
			
		||||
        solana_netutil::verify_reachable_ports(
 | 
			
		||||
            &cluster_entrypoint.gossip,
 | 
			
		||||
            tcp_listeners,
 | 
			
		||||
            &udp_sockets,
 | 
			
		||||
        );
 | 
			
		||||
 | 
			
		||||
        let genesis_blockhash = initialize_ledger_path(
 | 
			
		||||
            cluster_entrypoint,
 | 
			
		||||
            &ledger_path,
 | 
			
		||||
            matches.is_present("no_snapshot_fetch"),
 | 
			
		||||
        )
 | 
			
		||||
        .unwrap_or_else(|err| {
 | 
			
		||||
            error!("Failed to download ledger: {}", err);
 | 
			
		||||
            exit(1);
 | 
			
		||||
        });
 | 
			
		||||
 | 
			
		||||
        if let Some(expected_genesis_blockhash) = validator_config.expected_genesis_blockhash {
 | 
			
		||||
            if expected_genesis_blockhash != genesis_blockhash {
 | 
			
		||||
                error!(
 | 
			
		||||
                    "Genesis blockhash mismatch: expected {} but local genesis blockhash is {}",
 | 
			
		||||
                    expected_genesis_blockhash, genesis_blockhash,
 | 
			
		||||
                );
 | 
			
		||||
                exit(1);
 | 
			
		||||
            }
 | 
			
		||||
        }
 | 
			
		||||
        validator_config.expected_genesis_blockhash = Some(genesis_blockhash);
 | 
			
		||||
    } else {
 | 
			
		||||
        // Without a cluster entrypoint, ledger_path must already be present
 | 
			
		||||
        if !ledger_path.is_dir() {
 | 
			
		||||
            error!(
 | 
			
		||||
                "ledger directory does not exist or is not accessible: {:?}",
 | 
			
		||||
                ledger_path
 | 
			
		||||
            );
 | 
			
		||||
            exit(1);
 | 
			
		||||
        }
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    let validator = Validator::new(
 | 
			
		||||
        node,
 | 
			
		||||
        &Arc::new(keypair),
 | 
			
		||||
        &ledger_path,
 | 
			
		||||
        &vote_account,
 | 
			
		||||
        &Arc::new(voting_keypair),
 | 
			
		||||
        &Arc::new(storage_keypair),
 | 
			
		||||
        cluster_entrypoint.as_ref(),
 | 
			
		||||
        verify_ledger,
 | 
			
		||||
        &validator_config,
 | 
			
		||||
    );
 | 
			
		||||
 | 
			
		||||
    if let Some(filename) = init_complete_file {
 | 
			
		||||
        File::create(filename).unwrap_or_else(|_| {
 | 
			
		||||
            error!("Unable to create: {}", filename);
 | 
			
		||||
            exit(1);
 | 
			
		||||
        });
 | 
			
		||||
    }
 | 
			
		||||
    info!("Validator initialized");
 | 
			
		||||
    validator.join().expect("validator exit");
 | 
			
		||||
    info!("Validator exiting..");
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user