mirror of
https://github.com/OffchainLabs/prysm.git
synced 2026-01-09 15:37:56 -05:00
#### This PR sets the foundation for the new logging features. --- The goal of this big PR is the following: 1. Adding a log.go file to every package: [_commit_](54f6396d4c) - Writing a bash script that adds the log.go file to every package that imports logrus, except the excluded packages, configured at the top of the bash script. - the log.go file creates a log variable and sets a field called `package` to the full path of that package. - I have tried to fix every error/problem that came from mass generation of this file. (duplicate declarations, different prefix names, etc...) - some packages had the log.go file from before, and had some helper functions in there as well. I've moved all of them to a `log_helpers.go` file within each package. 2. Create a CI rule which verifies that: [_commit_](b799c3a0ef) - every package which imports logrus, also has a log.go file, except the excluded packages. - the `package` field of each log.go variable, has the correct path. (to detect when we move a package or change it's name) - I pushed a commit with a manually changed log.go file to trigger the ci check failure and it worked. 3. Alter the logging system to read the prefix from this `package` field for every log while outputing: [_commit_](b0c7f1146c) - some packages have/want/need a different log prefix than their package name (like `kv`). This can be solved by keeping a map of package paths to prefix names somewhere. --- **Some notes:** - Please review everything carefully. - I created the `prefixReplacement` map and populated the data that I deemed necessary. Please check it and complain if something doesn't make sense or is missing. I attached at the bottom, the list of all the packages that used to use a different name than their package name as their prefix. - I have chosen to mark some packages to be excluded from this whole process. They will either not log anything, or log without a prefix, or log using their previously defined prefix. See the list of exclusions in the bottom. - I fixed all the tests that failed because of this change. These were failing because they were expecting the old prefix to be in the generated logs. I have changed those to expect the new `package` field instead. This might not be a great solution. Ideally we might want to remove this from the tests so they only test for relevant fields in the logs. but this is a problem for another day. - Please run the node with this config, and mention if you see something weird in the logs. (use different verbosities) - The CI workflow uses a script that basically runs the `hack/gen-logs.sh` and checks that the git diff is zero. that script is `hack/check-logs.sh`. This means that if one runs this script locally, it will not actually _check_ anything, rather than just regenerate the log.go files and fix any mistake. This might be confusing. Please suggest solutions if you think it's a problem. --- **A list of packages that used a different prefix than their package names for their logs:** - beacon-chain/cache/depositsnapshot/ package depositsnapshot, prefix "cache" - beacon-chain/core/transition/log.go — package transition, prefix "state" - beacon-chain/db/kv/log.go — package kv, prefix "db" - beacon-chain/db/slasherkv/log.go — package slasherkv, prefix "slasherdb" - beacon-chain/db/pruner/pruner.go — package pruner, prefix "db-pruner" - beacon-chain/light-client/log.go — package light_client, prefix "light-client" - beacon-chain/operations/attestations/log.go — package attestations, prefix "pool/attestations" - beacon-chain/operations/slashings/log.go — package slashings, prefix "pool/slashings" - beacon-chain/rpc/core/log.go — package core, prefix "rpc/core" - beacon-chain/rpc/eth/beacon/log.go — package beacon, prefix "rpc/beaconv1" - beacon-chain/rpc/eth/validator/log.go — package validator, prefix "beacon-api" - beacon-chain/rpc/prysm/v1alpha1/beacon/log.go — package beacon, prefix "rpc" - beacon-chain/rpc/prysm/v1alpha1/validator/log.go — package validator, prefix "rpc/validator" - beacon-chain/state/stategen/log.go — package stategen, prefix "state-gen" - beacon-chain/sync/checkpoint/log.go — package checkpoint, prefix "checkpoint-sync" - beacon-chain/sync/initial-sync/log.go — package initialsync, prefix "initial-sync" - cmd/prysmctl/p2p/log.go — package p2p, prefix "prysmctl-p2p" - config/features/log.go -- package features, prefix "flags" - io/file/log.go — package file, prefix "fileutil" - proto/prysm/v1alpha1/log.go — package eth, prefix "protobuf" - validator/client/beacon-api/log.go — package beacon_api, prefix "beacon-api" - validator/db/kv/log.go — package kv, prefix "db" - validator/db/filesystem/db.go — package filesystem, prefix "db" - validator/keymanager/derived/log.go — package derived, prefix "derived-keymanager" - validator/keymanager/local/log.go — package local, prefix "local-keymanager" - validator/keymanager/remote-web3signer/log.go — package remote_web3signer, prefix "remote-keymanager" - validator/keymanager/remote-web3signer/internal/log.go — package internal, prefix "remote-web3signer- internal" - beacon-chain/forkchoice/doubly... prefix is "forkchoice-doublylinkedtree" **List of excluded directories (their subdirectories are also excluded):** ``` EXCLUDED_PATH_PREFIXES=( "testing" "validator/client/testutil" "beacon-chain/p2p/testing" "beacon-chain/rpc/eth/config" "beacon-chain/rpc/prysm/v1alpha1/debug" "tools" "runtime" "monitoring" "io" "cmd" ".well-known" "changelog" "hack" "specrefs" "third_party" "bazel-out" "bazel-bin" "bazel-prysm" "bazel-testlogs" "build" ".github" ".jj" ".idea" ".vscode" ) ```
385 lines
15 KiB
Go
385 lines
15 KiB
Go
package grpc_api
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"strconv"
|
|
|
|
"github.com/OffchainLabs/prysm/v7/api/client"
|
|
eventClient "github.com/OffchainLabs/prysm/v7/api/client/event"
|
|
"github.com/OffchainLabs/prysm/v7/api/server/structs"
|
|
"github.com/OffchainLabs/prysm/v7/config/features"
|
|
"github.com/OffchainLabs/prysm/v7/consensus-types/primitives"
|
|
"github.com/OffchainLabs/prysm/v7/encoding/bytesutil"
|
|
"github.com/OffchainLabs/prysm/v7/monitoring/tracing/trace"
|
|
ethpb "github.com/OffchainLabs/prysm/v7/proto/prysm/v1alpha1"
|
|
"github.com/OffchainLabs/prysm/v7/validator/client/iface"
|
|
"github.com/ethereum/go-ethereum/common/hexutil"
|
|
"github.com/golang/protobuf/ptypes/empty"
|
|
"github.com/pkg/errors"
|
|
"google.golang.org/grpc"
|
|
"google.golang.org/grpc/codes"
|
|
"google.golang.org/grpc/status"
|
|
)
|
|
|
|
type grpcValidatorClient struct {
|
|
beaconNodeValidatorClient ethpb.BeaconNodeValidatorClient
|
|
isEventStreamRunning bool
|
|
}
|
|
|
|
func (c *grpcValidatorClient) Duties(ctx context.Context, in *ethpb.DutiesRequest) (*ethpb.ValidatorDutiesContainer, error) {
|
|
if features.Get().DisableDutiesV2 {
|
|
return c.getDuties(ctx, in)
|
|
}
|
|
dutiesResponse, err := c.beaconNodeValidatorClient.GetDutiesV2(ctx, in)
|
|
if err != nil {
|
|
if status.Code(err) == codes.Unimplemented {
|
|
log.Warn("GetDutiesV2 returned status code unavailable, falling back to GetDuties")
|
|
return c.getDuties(ctx, in)
|
|
}
|
|
return nil, errors.Wrap(
|
|
client.ErrConnectionIssue,
|
|
errors.Wrap(err, "getDutiesV2").Error(),
|
|
)
|
|
}
|
|
return toValidatorDutiesContainerV2(dutiesResponse)
|
|
}
|
|
|
|
// getDuties is calling the v1 of get duties
|
|
func (c *grpcValidatorClient) getDuties(ctx context.Context, in *ethpb.DutiesRequest) (*ethpb.ValidatorDutiesContainer, error) {
|
|
dutiesResponse, err := c.beaconNodeValidatorClient.GetDuties(ctx, in)
|
|
if err != nil {
|
|
return nil, errors.Wrap(
|
|
client.ErrConnectionIssue,
|
|
errors.Wrap(err, "getDuties").Error(),
|
|
)
|
|
}
|
|
return toValidatorDutiesContainer(dutiesResponse)
|
|
}
|
|
|
|
func toValidatorDutiesContainer(dutiesResponse *ethpb.DutiesResponse) (*ethpb.ValidatorDutiesContainer, error) {
|
|
currentDuties := make([]*ethpb.ValidatorDuty, len(dutiesResponse.CurrentEpochDuties))
|
|
for i, cd := range dutiesResponse.CurrentEpochDuties {
|
|
duty, err := toValidatorDuty(cd)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
currentDuties[i] = duty
|
|
}
|
|
nextDuties := make([]*ethpb.ValidatorDuty, len(dutiesResponse.NextEpochDuties))
|
|
for i, nd := range dutiesResponse.NextEpochDuties {
|
|
duty, err := toValidatorDuty(nd)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
nextDuties[i] = duty
|
|
}
|
|
return ðpb.ValidatorDutiesContainer{
|
|
PrevDependentRoot: dutiesResponse.PreviousDutyDependentRoot,
|
|
CurrDependentRoot: dutiesResponse.CurrentDutyDependentRoot,
|
|
CurrentEpochDuties: currentDuties,
|
|
NextEpochDuties: nextDuties,
|
|
}, nil
|
|
}
|
|
|
|
func toValidatorDuty(duty *ethpb.DutiesResponse_Duty) (*ethpb.ValidatorDuty, error) {
|
|
var valIndexInCommittee uint64
|
|
// valIndexInCommittee will be 0 in case we don't get a match. This is a potential false positive,
|
|
// however it's an impossible condition because every validator must be assigned to a committee.
|
|
for cIndex, vIndex := range duty.Committee {
|
|
if vIndex == duty.ValidatorIndex {
|
|
valIndexInCommittee = uint64(cIndex)
|
|
break
|
|
}
|
|
}
|
|
return ðpb.ValidatorDuty{
|
|
CommitteeLength: uint64(len(duty.Committee)),
|
|
CommitteeIndex: duty.CommitteeIndex,
|
|
CommitteesAtSlot: duty.CommitteesAtSlot, // GRPC doesn't use this value though
|
|
ValidatorCommitteeIndex: valIndexInCommittee,
|
|
AttesterSlot: duty.AttesterSlot,
|
|
ProposerSlots: duty.ProposerSlots,
|
|
PublicKey: bytesutil.SafeCopyBytes(duty.PublicKey),
|
|
Status: duty.Status,
|
|
ValidatorIndex: duty.ValidatorIndex,
|
|
IsSyncCommittee: duty.IsSyncCommittee,
|
|
}, nil
|
|
}
|
|
|
|
func toValidatorDutiesContainerV2(dutiesResponse *ethpb.DutiesV2Response) (*ethpb.ValidatorDutiesContainer, error) {
|
|
currentDuties := make([]*ethpb.ValidatorDuty, len(dutiesResponse.CurrentEpochDuties))
|
|
for i, cd := range dutiesResponse.CurrentEpochDuties {
|
|
duty, err := toValidatorDutyV2(cd)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
currentDuties[i] = duty
|
|
}
|
|
nextDuties := make([]*ethpb.ValidatorDuty, len(dutiesResponse.NextEpochDuties))
|
|
for i, nd := range dutiesResponse.NextEpochDuties {
|
|
duty, err := toValidatorDutyV2(nd)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
nextDuties[i] = duty
|
|
}
|
|
return ðpb.ValidatorDutiesContainer{
|
|
PrevDependentRoot: dutiesResponse.PreviousDutyDependentRoot,
|
|
CurrDependentRoot: dutiesResponse.CurrentDutyDependentRoot,
|
|
CurrentEpochDuties: currentDuties,
|
|
NextEpochDuties: nextDuties,
|
|
}, nil
|
|
}
|
|
|
|
func toValidatorDutyV2(duty *ethpb.DutiesV2Response_Duty) (*ethpb.ValidatorDuty, error) {
|
|
return ðpb.ValidatorDuty{
|
|
CommitteeLength: duty.CommitteeLength,
|
|
CommitteeIndex: duty.CommitteeIndex,
|
|
CommitteesAtSlot: duty.CommitteesAtSlot, // GRPC doesn't use this value though
|
|
ValidatorCommitteeIndex: duty.ValidatorCommitteeIndex,
|
|
AttesterSlot: duty.AttesterSlot,
|
|
ProposerSlots: duty.ProposerSlots,
|
|
PublicKey: bytesutil.SafeCopyBytes(duty.PublicKey),
|
|
Status: duty.Status,
|
|
ValidatorIndex: duty.ValidatorIndex,
|
|
IsSyncCommittee: duty.IsSyncCommittee,
|
|
}, nil
|
|
}
|
|
|
|
func (c *grpcValidatorClient) CheckDoppelGanger(ctx context.Context, in *ethpb.DoppelGangerRequest) (*ethpb.DoppelGangerResponse, error) {
|
|
return c.beaconNodeValidatorClient.CheckDoppelGanger(ctx, in)
|
|
}
|
|
|
|
func (c *grpcValidatorClient) DomainData(ctx context.Context, in *ethpb.DomainRequest) (*ethpb.DomainResponse, error) {
|
|
return c.beaconNodeValidatorClient.DomainData(ctx, in)
|
|
}
|
|
|
|
func (c *grpcValidatorClient) AttestationData(ctx context.Context, in *ethpb.AttestationDataRequest) (*ethpb.AttestationData, error) {
|
|
return c.beaconNodeValidatorClient.GetAttestationData(ctx, in)
|
|
}
|
|
|
|
func (c *grpcValidatorClient) BeaconBlock(ctx context.Context, in *ethpb.BlockRequest) (*ethpb.GenericBeaconBlock, error) {
|
|
return c.beaconNodeValidatorClient.GetBeaconBlock(ctx, in)
|
|
}
|
|
|
|
func (c *grpcValidatorClient) FeeRecipientByPubKey(ctx context.Context, in *ethpb.FeeRecipientByPubKeyRequest) (*ethpb.FeeRecipientByPubKeyResponse, error) {
|
|
return c.beaconNodeValidatorClient.GetFeeRecipientByPubKey(ctx, in)
|
|
}
|
|
|
|
func (c *grpcValidatorClient) SyncCommitteeContribution(ctx context.Context, in *ethpb.SyncCommitteeContributionRequest) (*ethpb.SyncCommitteeContribution, error) {
|
|
return c.beaconNodeValidatorClient.GetSyncCommitteeContribution(ctx, in)
|
|
}
|
|
|
|
func (c *grpcValidatorClient) SyncMessageBlockRoot(ctx context.Context, in *empty.Empty) (*ethpb.SyncMessageBlockRootResponse, error) {
|
|
return c.beaconNodeValidatorClient.GetSyncMessageBlockRoot(ctx, in)
|
|
}
|
|
|
|
func (c *grpcValidatorClient) SyncSubcommitteeIndex(ctx context.Context, in *ethpb.SyncSubcommitteeIndexRequest) (*ethpb.SyncSubcommitteeIndexResponse, error) {
|
|
return c.beaconNodeValidatorClient.GetSyncSubcommitteeIndex(ctx, in)
|
|
}
|
|
|
|
func (c *grpcValidatorClient) MultipleValidatorStatus(ctx context.Context, in *ethpb.MultipleValidatorStatusRequest) (*ethpb.MultipleValidatorStatusResponse, error) {
|
|
return c.beaconNodeValidatorClient.MultipleValidatorStatus(ctx, in)
|
|
}
|
|
|
|
func (c *grpcValidatorClient) PrepareBeaconProposer(ctx context.Context, in *ethpb.PrepareBeaconProposerRequest) (*empty.Empty, error) {
|
|
return c.beaconNodeValidatorClient.PrepareBeaconProposer(ctx, in)
|
|
}
|
|
|
|
func (c *grpcValidatorClient) ProposeAttestation(ctx context.Context, in *ethpb.Attestation) (*ethpb.AttestResponse, error) {
|
|
return c.beaconNodeValidatorClient.ProposeAttestation(ctx, in)
|
|
}
|
|
|
|
func (c *grpcValidatorClient) ProposeAttestationElectra(ctx context.Context, in *ethpb.SingleAttestation) (*ethpb.AttestResponse, error) {
|
|
return c.beaconNodeValidatorClient.ProposeAttestationElectra(ctx, in)
|
|
}
|
|
|
|
func (c *grpcValidatorClient) ProposeBeaconBlock(ctx context.Context, in *ethpb.GenericSignedBeaconBlock) (*ethpb.ProposeResponse, error) {
|
|
return c.beaconNodeValidatorClient.ProposeBeaconBlock(ctx, in)
|
|
}
|
|
|
|
func (c *grpcValidatorClient) ProposeExit(ctx context.Context, in *ethpb.SignedVoluntaryExit) (*ethpb.ProposeExitResponse, error) {
|
|
return c.beaconNodeValidatorClient.ProposeExit(ctx, in)
|
|
}
|
|
|
|
func (c *grpcValidatorClient) StreamBlocksAltair(ctx context.Context, in *ethpb.StreamBlocksRequest) (ethpb.BeaconNodeValidator_StreamBlocksAltairClient, error) {
|
|
return c.beaconNodeValidatorClient.StreamBlocksAltair(ctx, in)
|
|
}
|
|
|
|
func (c *grpcValidatorClient) SubmitAggregateSelectionProof(ctx context.Context, in *ethpb.AggregateSelectionRequest, _ primitives.ValidatorIndex, _ uint64) (*ethpb.AggregateSelectionResponse, error) {
|
|
return c.beaconNodeValidatorClient.SubmitAggregateSelectionProof(ctx, in)
|
|
}
|
|
|
|
func (c *grpcValidatorClient) SubmitAggregateSelectionProofElectra(ctx context.Context, in *ethpb.AggregateSelectionRequest, _ primitives.ValidatorIndex, _ uint64) (*ethpb.AggregateSelectionElectraResponse, error) {
|
|
return c.beaconNodeValidatorClient.SubmitAggregateSelectionProofElectra(ctx, in)
|
|
}
|
|
|
|
func (c *grpcValidatorClient) SubmitSignedAggregateSelectionProof(ctx context.Context, in *ethpb.SignedAggregateSubmitRequest) (*ethpb.SignedAggregateSubmitResponse, error) {
|
|
return c.beaconNodeValidatorClient.SubmitSignedAggregateSelectionProof(ctx, in)
|
|
}
|
|
|
|
func (c *grpcValidatorClient) SubmitSignedAggregateSelectionProofElectra(ctx context.Context, in *ethpb.SignedAggregateSubmitElectraRequest) (*ethpb.SignedAggregateSubmitResponse, error) {
|
|
return c.beaconNodeValidatorClient.SubmitSignedAggregateSelectionProofElectra(ctx, in)
|
|
}
|
|
|
|
func (c *grpcValidatorClient) SubmitSignedContributionAndProof(ctx context.Context, in *ethpb.SignedContributionAndProof) (*empty.Empty, error) {
|
|
return c.beaconNodeValidatorClient.SubmitSignedContributionAndProof(ctx, in)
|
|
}
|
|
|
|
func (c *grpcValidatorClient) SubmitSyncMessage(ctx context.Context, in *ethpb.SyncCommitteeMessage) (*empty.Empty, error) {
|
|
return c.beaconNodeValidatorClient.SubmitSyncMessage(ctx, in)
|
|
}
|
|
|
|
func (c *grpcValidatorClient) SubmitValidatorRegistrations(ctx context.Context, in *ethpb.SignedValidatorRegistrationsV1) (*empty.Empty, error) {
|
|
return c.beaconNodeValidatorClient.SubmitValidatorRegistrations(ctx, in)
|
|
}
|
|
|
|
func (c *grpcValidatorClient) SubscribeCommitteeSubnets(ctx context.Context, in *ethpb.CommitteeSubnetsSubscribeRequest, _ []*ethpb.ValidatorDuty) (*empty.Empty, error) {
|
|
return c.beaconNodeValidatorClient.SubscribeCommitteeSubnets(ctx, in)
|
|
}
|
|
|
|
func (c *grpcValidatorClient) ValidatorIndex(ctx context.Context, in *ethpb.ValidatorIndexRequest) (*ethpb.ValidatorIndexResponse, error) {
|
|
return c.beaconNodeValidatorClient.ValidatorIndex(ctx, in)
|
|
}
|
|
|
|
func (c *grpcValidatorClient) ValidatorStatus(ctx context.Context, in *ethpb.ValidatorStatusRequest) (*ethpb.ValidatorStatusResponse, error) {
|
|
return c.beaconNodeValidatorClient.ValidatorStatus(ctx, in)
|
|
}
|
|
|
|
// Deprecated: Do not use.
|
|
func (c *grpcValidatorClient) WaitForChainStart(ctx context.Context, in *empty.Empty) (*ethpb.ChainStartResponse, error) {
|
|
stream, err := c.beaconNodeValidatorClient.WaitForChainStart(ctx, in)
|
|
if err != nil {
|
|
return nil, errors.Wrap(
|
|
client.ErrConnectionIssue,
|
|
errors.Wrap(err, "could not setup beacon chain ChainStart streaming client").Error(),
|
|
)
|
|
}
|
|
|
|
return stream.Recv()
|
|
}
|
|
|
|
func (c *grpcValidatorClient) AssignValidatorToSubnet(ctx context.Context, in *ethpb.AssignValidatorToSubnetRequest) (*empty.Empty, error) {
|
|
return c.beaconNodeValidatorClient.AssignValidatorToSubnet(ctx, in)
|
|
}
|
|
func (c *grpcValidatorClient) AggregatedSigAndAggregationBits(
|
|
ctx context.Context,
|
|
in *ethpb.AggregatedSigAndAggregationBitsRequest,
|
|
) (*ethpb.AggregatedSigAndAggregationBitsResponse, error) {
|
|
return c.beaconNodeValidatorClient.AggregatedSigAndAggregationBits(ctx, in)
|
|
}
|
|
|
|
func (*grpcValidatorClient) AggregatedSelections(context.Context, []iface.BeaconCommitteeSelection) ([]iface.BeaconCommitteeSelection, error) {
|
|
return nil, iface.ErrNotSupported
|
|
}
|
|
|
|
func (*grpcValidatorClient) AggregatedSyncSelections(context.Context, []iface.SyncCommitteeSelection) ([]iface.SyncCommitteeSelection, error) {
|
|
return nil, iface.ErrNotSupported
|
|
}
|
|
|
|
func NewGrpcValidatorClient(cc grpc.ClientConnInterface) iface.ValidatorClient {
|
|
return &grpcValidatorClient{ethpb.NewBeaconNodeValidatorClient(cc), false}
|
|
}
|
|
|
|
func (c *grpcValidatorClient) StartEventStream(ctx context.Context, topics []string, eventsChannel chan<- *eventClient.Event) {
|
|
ctx, span := trace.StartSpan(ctx, "validator.gRPCClient.StartEventStream")
|
|
defer span.End()
|
|
if len(topics) == 0 {
|
|
eventsChannel <- &eventClient.Event{
|
|
EventType: eventClient.EventError,
|
|
Data: []byte(errors.New("no topics were added").Error()),
|
|
}
|
|
return
|
|
}
|
|
// TODO(13563): ONLY WORKS WITH HEAD TOPIC.
|
|
containsHead := false
|
|
for i := range topics {
|
|
if topics[i] == eventClient.EventHead {
|
|
containsHead = true
|
|
}
|
|
}
|
|
if !containsHead {
|
|
eventsChannel <- &eventClient.Event{
|
|
EventType: eventClient.EventConnectionError,
|
|
Data: []byte(errors.Wrap(client.ErrConnectionIssue, "gRPC only supports the head topic, and head topic was not passed").Error()),
|
|
}
|
|
}
|
|
if containsHead && len(topics) > 1 {
|
|
log.Warn("gRPC only supports the head topic, other topics will be ignored")
|
|
}
|
|
|
|
stream, err := c.beaconNodeValidatorClient.StreamSlots(ctx, ðpb.StreamSlotsRequest{VerifiedOnly: true})
|
|
if err != nil {
|
|
eventsChannel <- &eventClient.Event{
|
|
EventType: eventClient.EventConnectionError,
|
|
Data: []byte(errors.Wrap(client.ErrConnectionIssue, err.Error()).Error()),
|
|
}
|
|
return
|
|
}
|
|
c.isEventStreamRunning = true
|
|
for {
|
|
select {
|
|
case <-ctx.Done():
|
|
log.Info("Context canceled, stopping event stream")
|
|
c.isEventStreamRunning = false
|
|
return
|
|
default:
|
|
if ctx.Err() != nil {
|
|
c.isEventStreamRunning = false
|
|
if errors.Is(ctx.Err(), context.Canceled) {
|
|
eventsChannel <- &eventClient.Event{
|
|
EventType: eventClient.EventConnectionError,
|
|
Data: []byte(errors.Wrap(client.ErrConnectionIssue, ctx.Err().Error()).Error()),
|
|
}
|
|
return
|
|
}
|
|
eventsChannel <- &eventClient.Event{
|
|
EventType: eventClient.EventError,
|
|
Data: []byte(ctx.Err().Error()),
|
|
}
|
|
return
|
|
}
|
|
res, err := stream.Recv()
|
|
if err != nil {
|
|
c.isEventStreamRunning = false
|
|
eventsChannel <- &eventClient.Event{
|
|
EventType: eventClient.EventConnectionError,
|
|
Data: []byte(errors.Wrap(client.ErrConnectionIssue, err.Error()).Error()),
|
|
}
|
|
return
|
|
}
|
|
if res == nil {
|
|
continue
|
|
}
|
|
b, err := json.Marshal(structs.HeadEvent{
|
|
Slot: strconv.FormatUint(uint64(res.Slot), 10),
|
|
PreviousDutyDependentRoot: hexutil.Encode(res.PreviousDutyDependentRoot),
|
|
CurrentDutyDependentRoot: hexutil.Encode(res.CurrentDutyDependentRoot),
|
|
})
|
|
if err != nil {
|
|
eventsChannel <- &eventClient.Event{
|
|
EventType: eventClient.EventError,
|
|
Data: []byte(errors.Wrap(err, "failed to marshal Head Event").Error()),
|
|
}
|
|
}
|
|
eventsChannel <- &eventClient.Event{
|
|
EventType: eventClient.EventHead,
|
|
Data: b,
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
func (c *grpcValidatorClient) EventStreamIsRunning() bool {
|
|
return c.isEventStreamRunning
|
|
}
|
|
|
|
func (*grpcValidatorClient) Host() string {
|
|
log.Warn(iface.ErrNotSupported)
|
|
return ""
|
|
}
|
|
|
|
func (*grpcValidatorClient) SetHost(_ string) {
|
|
log.Warn(iface.ErrNotSupported)
|
|
}
|