solutions/node/src/service.rs

303 lines
9.8 KiB
Rust
Raw Normal View History

2019-08-29 15:44:46 +00:00
//! Service and ServiceFactory implementation. Specialized wrapper over substrate service.
use std::sync::Arc;
use std::time::Duration;
2020-07-25 12:35:30 +00:00
use sc_client_api::{ExecutorProvider, RemoteBackend};
use node_template_runtime::{self, opaque::Block, RuntimeApi};
2020-08-21 11:20:35 +00:00
use sc_service::{error::Error as ServiceError, Configuration, TaskManager};
2019-12-16 20:46:39 +00:00
use sp_inherents::InherentDataProviders;
use sc_executor::native_executor_instance;
pub use sc_executor::NativeExecutor;
use sp_consensus_aura::sr25519::{AuthorityPair as AuraPair};
2020-08-21 11:20:35 +00:00
use sc_finality_grandpa::{FinalityProofProvider as GrandpaFinalityProofProvider, SharedVoterState};
2019-08-29 15:44:46 +00:00
// Our native executor instance.
native_executor_instance!(
pub Executor,
node_template_runtime::api::dispatch,
node_template_runtime::native_version,
2019-08-29 15:44:46 +00:00
);
2020-07-25 12:35:30 +00:00
type FullClient = sc_service::TFullClient<Block, RuntimeApi, Executor>;
type FullBackend = sc_service::TFullBackend<Block>;
type FullSelectChain = sc_consensus::LongestChain<FullBackend, Block>;
2020-08-21 11:20:35 +00:00
pub fn new_partial(config: &Configuration) -> Result<sc_service::PartialComponents<
FullClient, FullBackend, FullSelectChain,
sp_consensus::DefaultImportQueue<Block, FullClient>,
sc_transaction_pool::FullPool<Block, FullClient>,
(
sc_consensus_aura::AuraBlockImport<
Block,
FullClient,
sc_finality_grandpa::GrandpaBlockImport<FullBackend, Block, FullClient, FullSelectChain>,
AuraPair
>,
2020-08-21 11:20:35 +00:00
sc_finality_grandpa::LinkHalf<Block, FullClient, FullSelectChain>
)
>, ServiceError> {
2020-07-25 12:35:30 +00:00
let inherent_data_providers = sp_inherents::InherentDataProviders::new();
2019-08-29 15:44:46 +00:00
2020-07-25 12:35:30 +00:00
let (client, backend, keystore, task_manager) =
sc_service::new_full_parts::<Block, RuntimeApi, Executor>(&config)?;
let client = Arc::new(client);
2019-10-20 12:22:24 +00:00
2020-07-25 12:35:30 +00:00
let select_chain = sc_consensus::LongestChain::new(backend.clone());
2020-07-25 12:35:30 +00:00
let transaction_pool = sc_transaction_pool::BasicPool::new_full(
config.transaction_pool.clone(),
config.prometheus_registry(),
task_manager.spawn_handle(),
client.clone(),
);
2020-01-06 20:58:38 +00:00
2020-07-25 12:35:30 +00:00
let (grandpa_block_import, grandpa_link) = sc_finality_grandpa::block_import(
client.clone(), &(client.clone() as Arc<_>), select_chain.clone(),
)?;
2019-08-29 15:44:46 +00:00
2020-07-25 12:35:30 +00:00
let aura_block_import = sc_consensus_aura::AuraBlockImport::<_, _, _, AuraPair>::new(
grandpa_block_import.clone(), client.clone(),
);
2019-08-29 15:44:46 +00:00
2020-08-21 11:20:35 +00:00
let import_queue = sc_consensus_aura::import_queue::<_, _, _, AuraPair, _, _>(
2020-07-25 12:35:30 +00:00
sc_consensus_aura::slot_duration(&*client)?,
aura_block_import.clone(),
2020-07-25 12:35:30 +00:00
Some(Box::new(grandpa_block_import.clone())),
None,
client.clone(),
inherent_data_providers.clone(),
&task_manager.spawn_handle(),
config.prometheus_registry(),
2020-08-21 11:20:35 +00:00
sp_consensus::CanAuthorWithNativeVersion::new(client.executor().clone()),
2020-07-25 12:35:30 +00:00
)?;
2019-08-29 15:44:46 +00:00
2020-08-21 11:20:35 +00:00
Ok(sc_service::PartialComponents {
client, backend, task_manager, import_queue, keystore, select_chain, transaction_pool,
inherent_data_providers,
other: (aura_block_import, grandpa_link),
2020-08-21 11:20:35 +00:00
})
2019-08-29 15:44:46 +00:00
}
/// Builds a new service for a full client.
2020-08-21 11:20:35 +00:00
pub fn new_full(config: Configuration) -> Result<TaskManager, ServiceError> {
let sc_service::PartialComponents {
client, backend, mut task_manager, import_queue, keystore, select_chain, transaction_pool,
inherent_data_providers,
other: (block_import, grandpa_link),
} = new_partial(&config)?;
let finality_proof_provider =
GrandpaFinalityProofProvider::new_for_service(backend.clone(), client.clone());
let (network, network_status_sinks, system_rpc_tx, network_starter) =
sc_service::build_network(sc_service::BuildNetworkParams {
config: &config,
client: client.clone(),
transaction_pool: transaction_pool.clone(),
spawn_handle: task_manager.spawn_handle(),
import_queue,
on_demand: None,
block_announce_validator_builder: None,
finality_proof_request_builder: None,
finality_proof_provider: Some(finality_proof_provider.clone()),
})?;
if config.offchain_worker.enabled {
sc_service::build_offchain_workers(
&config, backend.clone(), task_manager.spawn_handle(), client.clone(), network.clone(),
);
}
let role = config.role.clone();
let force_authoring = config.force_authoring;
let name = config.network.node_name.clone();
let enable_grandpa = !config.disable_grandpa;
let prometheus_registry = config.prometheus_registry().cloned();
let telemetry_connection_sinks = sc_service::TelemetryConnectionSinks::default();
let rpc_extensions_builder = {
let client = client.clone();
let pool = transaction_pool.clone();
Box::new(move |deny_unsafe, _| {
let deps = crate::rpc::FullDeps {
client: client.clone(),
pool: pool.clone(),
deny_unsafe,
};
crate::rpc::create_full(deps)
})
2020-07-25 12:35:30 +00:00
};
2020-08-21 11:20:35 +00:00
sc_service::spawn_tasks(sc_service::SpawnTasksParams {
network: network.clone(),
client: client.clone(),
keystore: keystore.clone(),
task_manager: &mut task_manager,
transaction_pool: transaction_pool.clone(),
telemetry_connection_sinks: telemetry_connection_sinks.clone(),
rpc_extensions_builder: rpc_extensions_builder,
on_demand: None,
remote_blockchain: None,
backend, network_status_sinks, system_rpc_tx, config,
})?;
2019-08-29 15:44:46 +00:00
2020-04-15 11:33:19 +00:00
if role.is_authority() {
2020-05-25 21:48:38 +00:00
let proposer = sc_basic_authorship::ProposerFactory::new(
2020-07-25 12:35:30 +00:00
client.clone(),
transaction_pool,
prometheus_registry.as_ref(),
2020-05-25 21:48:38 +00:00
);
2019-08-29 15:44:46 +00:00
2019-12-16 20:46:39 +00:00
let can_author_with =
sp_consensus::CanAuthorWithNativeVersion::new(client.executor().clone());
2020-03-05 16:53:25 +00:00
let aura = sc_consensus_aura::start_aura::<_, _, _, _, _, AuraPair, _, _, _>(
sc_consensus_aura::slot_duration(&*client)?,
2020-07-25 12:35:30 +00:00
client.clone(),
2019-08-29 15:44:46 +00:00
select_chain,
block_import,
2019-10-20 12:22:24 +00:00
proposer,
2020-07-25 12:35:30 +00:00
network.clone(),
2019-10-20 12:22:24 +00:00
inherent_data_providers.clone(),
force_authoring,
2020-07-25 12:35:30 +00:00
keystore.clone(),
2019-12-16 20:46:39 +00:00
can_author_with,
2019-10-20 12:22:24 +00:00
)?;
2019-08-29 15:44:46 +00:00
2019-10-20 12:22:24 +00:00
// the AURA authoring task is considered essential, i.e. if it
2019-08-29 15:44:46 +00:00
// fails we take down the service with it.
2020-07-25 12:35:30 +00:00
task_manager.spawn_essential_handle().spawn_blocking("aura", aura);
2019-08-29 15:44:46 +00:00
}
2019-12-16 20:46:39 +00:00
// if the node isn't actively participating in consensus then it doesn't
// need a keystore, regardless of which protocol we use below.
2020-04-15 11:33:19 +00:00
let keystore = if role.is_authority() {
2020-07-25 12:35:30 +00:00
Some(keystore as sp_core::traits::BareCryptoStorePtr)
2019-12-16 20:46:39 +00:00
} else {
None
};
2020-04-15 11:33:19 +00:00
let grandpa_config = sc_finality_grandpa::Config {
2019-08-29 15:44:46 +00:00
// FIXME #1578 make this available through chainspec
gossip_duration: Duration::from_millis(333),
justification_period: 512,
name: Some(name),
2020-03-05 16:53:25 +00:00
observer_enabled: false,
2019-12-16 20:46:39 +00:00
keystore,
2020-04-15 11:33:19 +00:00
is_authority: role.is_network_authority(),
2019-08-29 15:44:46 +00:00
};
2020-03-05 16:53:25 +00:00
if enable_grandpa {
// start the full GRANDPA voter
// NOTE: non-authorities could run the GRANDPA observer protocol, but at
// this point the full voter should provide better guarantees of block
// and vote data availability than the observer. The observer has not
// been tested extensively yet and having most nodes in a network run it
// could lead to finality stalls.
2020-04-15 11:33:19 +00:00
let grandpa_config = sc_finality_grandpa::GrandpaParams {
2020-03-05 16:53:25 +00:00
config: grandpa_config,
link: grandpa_link,
2020-07-25 12:35:30 +00:00
network,
inherent_data_providers,
2020-08-21 11:20:35 +00:00
telemetry_on_connect: Some(telemetry_connection_sinks.on_connect_stream()),
2020-04-15 11:33:19 +00:00
voting_rule: sc_finality_grandpa::VotingRulesBuilder::default().build(),
2020-07-25 12:35:30 +00:00
prometheus_registry,
shared_voter_state: SharedVoterState::empty(),
2020-03-05 16:53:25 +00:00
};
// the GRANDPA voter task is considered infallible, i.e.
// if it fails we take down the service with it.
2020-07-25 12:35:30 +00:00
task_manager.spawn_essential_handle().spawn_blocking(
2020-03-05 16:53:25 +00:00
"grandpa-voter",
2020-04-15 11:33:19 +00:00
sc_finality_grandpa::run_grandpa_voter(grandpa_config)?
2020-03-05 16:53:25 +00:00
);
} else {
2020-04-15 11:33:19 +00:00
sc_finality_grandpa::setup_disabled_grandpa(
2020-07-25 12:35:30 +00:00
client,
2020-03-05 16:53:25 +00:00
&inherent_data_providers,
2020-07-25 12:35:30 +00:00
network,
2020-03-05 16:53:25 +00:00
)?;
2019-08-29 15:44:46 +00:00
}
2020-08-21 11:20:35 +00:00
network_starter.start_network();
2020-07-25 12:35:30 +00:00
Ok(task_manager)
2019-08-29 15:44:46 +00:00
}
/// Builds a new service for a light client.
2020-07-25 12:35:30 +00:00
pub fn new_light(config: Configuration) -> Result<TaskManager, ServiceError> {
2020-08-21 11:20:35 +00:00
let (client, backend, keystore, mut task_manager, on_demand) =
2020-07-25 12:35:30 +00:00
sc_service::new_light_parts::<Block, RuntimeApi, Executor>(&config)?;
2020-08-21 11:20:35 +00:00
let transaction_pool = Arc::new(sc_transaction_pool::BasicPool::new_light(
2020-07-25 12:35:30 +00:00
config.transaction_pool.clone(),
config.prometheus_registry(),
task_manager.spawn_handle(),
2020-08-21 11:20:35 +00:00
client.clone(),
on_demand.clone(),
));
2019-08-29 15:44:46 +00:00
2020-07-25 12:35:30 +00:00
let grandpa_block_import = sc_finality_grandpa::light_block_import(
client.clone(), backend.clone(), &(client.clone() as Arc<_>),
Arc::new(on_demand.checker().clone()) as Arc<_>,
)?;
let finality_proof_import = grandpa_block_import.clone();
let finality_proof_request_builder =
finality_proof_import.create_finality_proof_request_builder();
2020-03-05 16:53:25 +00:00
2020-08-21 11:20:35 +00:00
let import_queue = sc_consensus_aura::import_queue::<_, _, _, AuraPair, _, _>(
2020-07-25 12:35:30 +00:00
sc_consensus_aura::slot_duration(&*client)?,
grandpa_block_import,
None,
Some(Box::new(finality_proof_import)),
client.clone(),
InherentDataProviders::new(),
&task_manager.spawn_handle(),
config.prometheus_registry(),
2020-08-21 11:20:35 +00:00
sp_consensus::NeverCanAuthor,
2020-07-25 12:35:30 +00:00
)?;
2019-08-29 15:44:46 +00:00
2020-07-25 12:35:30 +00:00
let finality_proof_provider =
2020-08-21 11:20:35 +00:00
GrandpaFinalityProofProvider::new_for_service(backend.clone(), client.clone());
2019-08-29 15:44:46 +00:00
2020-08-21 11:20:35 +00:00
let (network, network_status_sinks, system_rpc_tx, network_starter) =
sc_service::build_network(sc_service::BuildNetworkParams {
config: &config,
client: client.clone(),
transaction_pool: transaction_pool.clone(),
spawn_handle: task_manager.spawn_handle(),
import_queue,
on_demand: Some(on_demand.clone()),
block_announce_validator_builder: None,
finality_proof_request_builder: Some(finality_proof_request_builder),
finality_proof_provider: Some(finality_proof_provider),
})?;
if config.offchain_worker.enabled {
sc_service::build_offchain_workers(
&config, backend.clone(), task_manager.spawn_handle(), client.clone(), network.clone(),
);
}
sc_service::spawn_tasks(sc_service::SpawnTasksParams {
2020-07-25 12:35:30 +00:00
remote_blockchain: Some(backend.remote_blockchain()),
2020-08-21 11:20:35 +00:00
transaction_pool,
task_manager: &mut task_manager,
on_demand: Some(on_demand),
rpc_extensions_builder: Box::new(|_, _| ()),
telemetry_connection_sinks: sc_service::TelemetryConnectionSinks::default(),
config,
client,
keystore,
backend,
network,
network_status_sinks,
system_rpc_tx,
})?;
network_starter.start_network();
Ok(task_manager)
2019-08-29 15:44:46 +00:00
}