mirror of
https://github.com/QuilibriumNetwork/ceremonyclient.git
synced 2026-02-26 21:07:26 +08:00
commit8e57cb3c50Author: Cassandra Heart <cassandra@quilibrium.com> Date: Mon May 27 00:06:39 2024 -0500 remove binaries, release ready commita032474e5fAuthor: Cassandra Heart <cassandra@quilibrium.com> Date: Mon May 27 00:04:25 2024 -0500 Signatory #8 added commit86ab72ea75Author: Cassandra Heart <cassandra@quilibrium.com> Date: Sun May 26 23:55:02 2024 -0500 Signatory #1 added commit9853bbff1cAuthor: Cassandra Heart <cassandra@quilibrium.com> Date: Sun May 26 23:52:43 2024 -0500 Signatory #16 added commitd1eb0bd2b2Author: Cassandra Heart <cassandra@quilibrium.com> Date: Sun May 26 23:24:51 2024 -0500 Signatory #2 added commit270591416bAuthor: Cassandra Heart <cassandra@quilibrium.com> Date: Sun May 26 22:33:53 2024 -0500 Signatory #3 added commitea767f9eaaAuthor: Cassandra Heart <cassandra@quilibrium.com> Date: Sun May 26 22:10:50 2024 -0500 Signatory #12 added commite73a0a005aAuthor: Cassandra Heart <cassandra@quilibrium.com> Date: Sun May 26 22:09:07 2024 -0500 Signatory #17 added commit07be249c52Author: Cassandra Heart <cassandra@quilibrium.com> Date: Sun May 26 22:04:40 2024 -0500 Signatory #14 added commitdbc014b812Author: 0xOzgur <29779769+0xOzgur@users.noreply.github.com> Date: Mon May 27 05:55:21 2024 +0300 Signatory #4 added (#223) commit13407f6ff3Author: Cassandra Heart <cassandra@quilibrium.com> Date: Sun May 26 21:34:26 2024 -0500 Signatory #13 added commit3731de7b66Author: Cassandra Heart <cassandra@quilibrium.com> Date: Sun May 26 21:33:50 2024 -0500 add digests commitb0a3493dd2Author: Cassandra Heart <cassandra@quilibrium.com> Date: Sun May 26 21:26:54 2024 -0500 replace binaries with patch build commit6a20b44441Author: Cassandra Heart <7929478+CassOnMars@users.noreply.github.com> Date: Sun May 26 21:15:07 2024 -0500 fix: switch RPC for peer and node info (#222) commit72d730d23fAuthor: Cassandra Heart <7929478+CassOnMars@users.noreply.github.com> Date: Sun May 26 20:53:38 2024 -0500 feat: recalibrate self-test on the fly (#221) commit99702af0b7Author: Marius Scurtescu <marius.scurtescu@gmail.com> Date: Sun May 26 19:31:39 2024 -0400 Signer related fixes (#220) * add pems 16 and 17 * remove .bin extension from generated binaries * no more json files to copy to docker image commit88d704ab16Author: Marius Scurtescu <marius.scurtescu@gmail.com> Date: Sun May 26 19:07:52 2024 -0400 Docker split take 2 (#219) * split runtime docker files into a docker subfolder * split DOCKER-README.md * updated docker instructions * add restore command * add image update related tasks * add command to test if P2P port is visible * Remove bootstrap peer (#189) * Change bootstrap servers to DHT-only peers (#187) * support voucher file-based claims (#183) * Change bootstrap servers to DHT-only peers Changing my bootstrap servers to DHT-only peers with somewhat lower specs. One of the new ones is in the US and the other one is in Switzerland. Both use reliable providers and have 10Gbps network interfaces. --------- Co-authored-by: Cassandra Heart <7929478+CassOnMars@users.noreply.github.com> * Don't run self-test in DHT-only mode (#186) * support voucher file-based claims (#183) * Don't run self-test in DHT-only mode The node tries to create a self-test when ran with the `-dht-only` flag, but it doesn't load the KZG ceremony data in DHT-only mode which leads to a crash. Don't run self-test when the `-dht-only` flag is set. I tested by starting a node locally with and without existing self-test and with the `-dht-only` flag. --------- Co-authored-by: Cassandra Heart <7929478+CassOnMars@users.noreply.github.com> * Embed json files in binary (#182) * Embed ceremony.json in binary * Embed retroactive_peers.json in binary * Signers build and verification tasks (#181) * add signers specific Taskfile * add verify tasks * move signer task under signer folder * create docker image specific for signers * map current user into docker image and container * ignore node-tmp-* * add verify:build:internal * prevent tasks with docker commands from being run inside a container * rename *:internal to *:container * add README.md * add pem files to git * Updating Q Guide link (#173) * Update README.md Updated link to Quilibrium guide to new website * Update README.md --------- Co-authored-by: littleblackcloud <163544315+littleblackcloud@users.noreply.github.com> Co-authored-by: Agost Biro <5764438+agostbiro@users.noreply.github.com> Co-authored-by: Cassandra Heart <7929478+CassOnMars@users.noreply.github.com> Co-authored-by: Demipoet <161999657+demipoet@users.noreply.github.com> commit20560176dcAuthor: Cassandra Heart <7929478+CassOnMars@users.noreply.github.com> Date: Sun May 26 17:17:36 2024 -0500 Revert "Change volume mapping so .config folder is created inside node folder…" (#218) This reverts commit27f50a92c6. commitb9ea4c158eAuthor: Cassandra Heart <7929478+CassOnMars@users.noreply.github.com> Date: Sun May 26 14:46:40 2024 -0500 fix: keys file remains null (#217) commit6ed6728bfdAuthor: luk <luk@luktech.dev> Date: Sun May 26 22:38:50 2024 +0300 switched get node info response to use masterClock frame for maxFrame field (#212) commit2bc8ab6a0aAuthor: Ravish Ahmad <ravishahmad16@gmail.com> Date: Mon May 27 01:07:53 2024 +0530 Update main.go to fix Q logo (#213) Q logo is not appearing correctly on the terminal while running node. Added a new line character after "Signature check passed" to fix it commit27f50a92c6Author: AvAcalho <158583728+AvAcalho@users.noreply.github.com> Date: Sun May 26 20:37:14 2024 +0100 Change volume mapping so .config folder is created inside node folder and not on root (#214) commit4656dedc2aAuthor: Cassandra Heart <7929478+CassOnMars@users.noreply.github.com> Date: Sun May 26 14:27:55 2024 -0500 experiment: verify in channel (#215) commit2bbd1e0690Author: Cassandra Heart <7929478+CassOnMars@users.noreply.github.com> Date: Sat May 25 00:22:50 2024 -0500 v1.4.18 (#193) * Remove bootstrap peer (#189) * Change bootstrap servers to DHT-only peers (#187) * support voucher file-based claims (#183) * Change bootstrap servers to DHT-only peers Changing my bootstrap servers to DHT-only peers with somewhat lower specs. One of the new ones is in the US and the other one is in Switzerland. Both use reliable providers and have 10Gbps network interfaces. --------- Co-authored-by: Cassandra Heart <7929478+CassOnMars@users.noreply.github.com> * Don't run self-test in DHT-only mode (#186) * support voucher file-based claims (#183) * Don't run self-test in DHT-only mode The node tries to create a self-test when ran with the `-dht-only` flag, but it doesn't load the KZG ceremony data in DHT-only mode which leads to a crash. Don't run self-test when the `-dht-only` flag is set. I tested by starting a node locally with and without existing self-test and with the `-dht-only` flag. --------- Co-authored-by: Cassandra Heart <7929478+CassOnMars@users.noreply.github.com> * Embed json files in binary (#182) * Embed ceremony.json in binary * Embed retroactive_peers.json in binary * Signers build and verification tasks (#181) * add signers specific Taskfile * add verify tasks * move signer task under signer folder * create docker image specific for signers * map current user into docker image and container * ignore node-tmp-* * add verify:build:internal * prevent tasks with docker commands from being run inside a container * rename *:internal to *:container * add README.md * add pem files to git * Updating Q Guide link (#173) * Update README.md Updated link to Quilibrium guide to new website * Update README.md * feat: network switching and namespaced announce strings/bitmasks (#190) * feat: network switching and namespaced announce strings/bitmasks * bump version name and logo * feat: mini pomw proofs as part of peer manifest (#191) * shift default config directory under current folder (#176) * feat: signature check (#192) * feat: signature check * adjust docker command so it doesn't invoke sigcheck * remove old version * add binaries and digests * fix bug, revert build * shasum has weird byte at end * proper binaries and digests * Signatory #13 added * Signatory #3 added * Signer 4 (#194) * Signatory #5 added * Signatory #9 added (#195) * Signatory #1 added * added sig.6 files (#196) * Signatories #8 and #16 added * Signatory #12 added * Add signature (#197) * reset build for v1.4.18 after testnet bug * updated build, resigned by #13 * Signatory #16 added * added sig.6 files (#198) * Signatory #8 added * Signatory #17 added * Signatory #1 added * Signatory #7 added * Signatory #4 added * Signatory #14 added * remove binaries, ready to ship --------- Co-authored-by: littleblackcloud <163544315+littleblackcloud@users.noreply.github.com> Co-authored-by: Agost Biro <5764438+agostbiro@users.noreply.github.com> Co-authored-by: Marius Scurtescu <marius.scurtescu@gmail.com> Co-authored-by: Demipoet <161999657+demipoet@users.noreply.github.com> Co-authored-by: 0xOzgur <29779769+0xOzgur@users.noreply.github.com> Co-authored-by: Freekers <1370857+Freekers@users.noreply.github.com>
424 lines
11 KiB
Go
424 lines
11 KiB
Go
package rpc
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"math/big"
|
|
"net/http"
|
|
|
|
"source.quilibrium.com/quilibrium/monorepo/node/config"
|
|
|
|
"github.com/libp2p/go-libp2p/core/peer"
|
|
|
|
"github.com/grpc-ecosystem/grpc-gateway/v2/runtime"
|
|
"github.com/iden3/go-iden3-crypto/poseidon"
|
|
"github.com/multiformats/go-multiaddr"
|
|
mn "github.com/multiformats/go-multiaddr/net"
|
|
"github.com/pkg/errors"
|
|
"go.uber.org/zap"
|
|
"google.golang.org/grpc"
|
|
"google.golang.org/grpc/credentials/insecure"
|
|
"google.golang.org/grpc/reflection"
|
|
"source.quilibrium.com/quilibrium/monorepo/node/consensus/master"
|
|
"source.quilibrium.com/quilibrium/monorepo/node/execution"
|
|
"source.quilibrium.com/quilibrium/monorepo/node/execution/intrinsics/ceremony/application"
|
|
"source.quilibrium.com/quilibrium/monorepo/node/keys"
|
|
"source.quilibrium.com/quilibrium/monorepo/node/p2p"
|
|
"source.quilibrium.com/quilibrium/monorepo/node/protobufs"
|
|
"source.quilibrium.com/quilibrium/monorepo/node/store"
|
|
"source.quilibrium.com/quilibrium/monorepo/node/tries"
|
|
)
|
|
|
|
type RPCServer struct {
|
|
protobufs.UnimplementedNodeServiceServer
|
|
listenAddrGRPC string
|
|
listenAddrHTTP string
|
|
logger *zap.Logger
|
|
clockStore store.ClockStore
|
|
keyManager keys.KeyManager
|
|
pubSub p2p.PubSub
|
|
masterClock *master.MasterClockConsensusEngine
|
|
executionEngines []execution.ExecutionEngine
|
|
}
|
|
|
|
// GetFrameInfo implements protobufs.NodeServiceServer.
|
|
func (r *RPCServer) GetFrameInfo(
|
|
ctx context.Context,
|
|
req *protobufs.GetFrameInfoRequest,
|
|
) (*protobufs.FrameInfoResponse, error) {
|
|
if bytes.Equal(req.Filter, p2p.BITMASK_ALL) {
|
|
frame, err := r.clockStore.GetMasterClockFrame(
|
|
req.Filter,
|
|
req.FrameNumber,
|
|
)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "get frame info")
|
|
}
|
|
|
|
return &protobufs.FrameInfoResponse{
|
|
ClockFrame: frame,
|
|
}, nil
|
|
} else if req.Selector == nil {
|
|
frame, _, err := r.clockStore.GetDataClockFrame(
|
|
req.Filter,
|
|
req.FrameNumber,
|
|
false,
|
|
)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "get frame info")
|
|
}
|
|
|
|
return &protobufs.FrameInfoResponse{
|
|
ClockFrame: frame,
|
|
}, nil
|
|
} else {
|
|
return nil, errors.Wrap(errors.New("not found"), "get frame info")
|
|
}
|
|
}
|
|
|
|
// GetFrames implements protobufs.NodeServiceServer.
|
|
func (r *RPCServer) GetFrames(
|
|
ctx context.Context,
|
|
req *protobufs.GetFramesRequest,
|
|
) (*protobufs.FramesResponse, error) {
|
|
if bytes.Equal(req.Filter, p2p.BITMASK_ALL) {
|
|
iter, err := r.clockStore.RangeMasterClockFrames(
|
|
req.Filter,
|
|
req.FromFrameNumber,
|
|
req.ToFrameNumber,
|
|
)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "get frames")
|
|
}
|
|
|
|
frames := []*protobufs.ClockFrame{}
|
|
for iter.First(); iter.Valid(); iter.Next() {
|
|
frame, err := iter.Value()
|
|
if err != nil {
|
|
iter.Close()
|
|
return nil, errors.Wrap(err, "get frames")
|
|
}
|
|
frames = append(frames, frame)
|
|
}
|
|
|
|
if err := iter.Close(); err != nil {
|
|
return nil, errors.Wrap(err, "get frames")
|
|
}
|
|
|
|
return &protobufs.FramesResponse{
|
|
TruncatedClockFrames: frames,
|
|
}, nil
|
|
} else {
|
|
iter, err := r.clockStore.RangeDataClockFrames(
|
|
req.Filter,
|
|
req.FromFrameNumber,
|
|
req.ToFrameNumber,
|
|
)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "get frame info")
|
|
}
|
|
|
|
frames := []*protobufs.ClockFrame{}
|
|
for iter.First(); iter.Valid(); iter.Next() {
|
|
frame, err := iter.TruncatedValue()
|
|
if err != nil {
|
|
iter.Close()
|
|
return nil, errors.Wrap(err, "get frames")
|
|
}
|
|
frames = append(frames, frame)
|
|
}
|
|
|
|
if err := iter.Close(); err != nil {
|
|
return nil, errors.Wrap(err, "get frames")
|
|
}
|
|
|
|
return &protobufs.FramesResponse{
|
|
TruncatedClockFrames: frames,
|
|
}, nil
|
|
}
|
|
}
|
|
|
|
// GetNetworkInfo implements protobufs.NodeServiceServer.
|
|
func (r *RPCServer) GetNetworkInfo(
|
|
ctx context.Context,
|
|
req *protobufs.GetNetworkInfoRequest,
|
|
) (*protobufs.NetworkInfoResponse, error) {
|
|
return r.pubSub.GetNetworkInfo(), nil
|
|
}
|
|
|
|
// GetNodeInfo implements protobufs.NodeServiceServer.
|
|
func (r *RPCServer) GetNodeInfo(
|
|
ctx context.Context,
|
|
req *protobufs.GetNodeInfoRequest,
|
|
) (*protobufs.NodeInfoResponse, error) {
|
|
peerID, err := peer.IDFromBytes(r.pubSub.GetPeerID())
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "getting id from bytes")
|
|
}
|
|
peerScore := r.pubSub.GetPeerScore(r.pubSub.GetPeerID())
|
|
|
|
return &protobufs.NodeInfoResponse{
|
|
PeerId: peerID.String(),
|
|
MaxFrame: r.masterClock.GetFrame().GetFrameNumber(),
|
|
PeerScore: uint64(peerScore),
|
|
Version: config.GetVersion(),
|
|
}, nil
|
|
}
|
|
|
|
// GetPeerInfo implements protobufs.NodeServiceServer.
|
|
func (r *RPCServer) GetPeerInfo(
|
|
ctx context.Context,
|
|
req *protobufs.GetPeerInfoRequest,
|
|
) (*protobufs.PeerInfoResponse, error) {
|
|
resp := &protobufs.PeerInfoResponse{}
|
|
manifests := r.masterClock.GetPeerManifests()
|
|
for _, m := range manifests.PeerManifests {
|
|
multiaddr := r.pubSub.GetMultiaddrOfPeer(m.PeerId)
|
|
addrs := []string{}
|
|
if multiaddr != "" {
|
|
addrs = append(addrs, multiaddr)
|
|
}
|
|
|
|
resp.PeerInfo = append(resp.PeerInfo, &protobufs.PeerInfo{
|
|
PeerId: m.PeerId,
|
|
Multiaddrs: addrs,
|
|
MaxFrame: m.MasterHeadFrame,
|
|
Timestamp: m.LastSeen,
|
|
// We can get away with this for this release only, we will want to add
|
|
// version info in manifests.
|
|
Version: config.GetVersion(),
|
|
})
|
|
}
|
|
return resp, nil
|
|
}
|
|
|
|
func (r *RPCServer) GetTokenInfo(
|
|
ctx context.Context,
|
|
req *protobufs.GetTokenInfoRequest,
|
|
) (*protobufs.TokenInfoResponse, error) {
|
|
provingKey, err := r.keyManager.GetRawKey(
|
|
"default-proving-key",
|
|
)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "get token info")
|
|
}
|
|
|
|
peerBytes := r.pubSub.GetPeerID()
|
|
peerAddr, err := poseidon.HashBytes(peerBytes)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
|
|
addr, err := poseidon.HashBytes(provingKey.PublicKey)
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
|
|
addrBytes := addr.Bytes()
|
|
addrBytes = append(make([]byte, 32-len(addrBytes)), addrBytes...)
|
|
|
|
peerAddrBytes := peerAddr.Bytes()
|
|
peerAddrBytes = append(make([]byte, 32-len(peerAddrBytes)), peerAddrBytes...)
|
|
|
|
frame, err := r.clockStore.GetLatestDataClockFrame(
|
|
append(
|
|
p2p.GetBloomFilter(application.CEREMONY_ADDRESS, 256, 3),
|
|
p2p.GetBloomFilterIndices(application.CEREMONY_ADDRESS, 65536, 24)...,
|
|
),
|
|
nil,
|
|
)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "get token info")
|
|
}
|
|
|
|
confirmed, err := application.MaterializeApplicationFromFrame(frame)
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "get token info")
|
|
}
|
|
|
|
confirmedTotal := new(big.Int)
|
|
ownedTotal := new(big.Int)
|
|
if confirmed.RewardTrie.Root == nil ||
|
|
(confirmed.RewardTrie.Root.External == nil &&
|
|
confirmed.RewardTrie.Root.Internal == nil) {
|
|
return &protobufs.TokenInfoResponse{
|
|
ConfirmedTokenSupply: confirmedTotal.FillBytes(make([]byte, 32)),
|
|
UnconfirmedTokenSupply: confirmedTotal.FillBytes(make([]byte, 32)),
|
|
OwnedTokens: ownedTotal.FillBytes(make([]byte, 32)),
|
|
UnconfirmedOwnedTokens: ownedTotal.FillBytes(make([]byte, 32)),
|
|
}, nil
|
|
}
|
|
|
|
limbs := []*tries.RewardInternalNode{}
|
|
if confirmed.RewardTrie.Root.Internal != nil {
|
|
limbs = append(limbs, confirmed.RewardTrie.Root.Internal)
|
|
} else {
|
|
confirmedTotal = confirmedTotal.Add(
|
|
confirmedTotal,
|
|
new(big.Int).SetUint64(confirmed.RewardTrie.Root.External.Total),
|
|
)
|
|
if bytes.Equal(
|
|
confirmed.RewardTrie.Root.External.Key,
|
|
addrBytes,
|
|
) {
|
|
ownedTotal = ownedTotal.Add(
|
|
ownedTotal,
|
|
new(big.Int).SetUint64(confirmed.RewardTrie.Root.External.Total),
|
|
)
|
|
}
|
|
}
|
|
|
|
for len(limbs) != 0 {
|
|
nextLimbs := []*tries.RewardInternalNode{}
|
|
for _, limb := range limbs {
|
|
for _, child := range limb.Child {
|
|
child := child
|
|
if child.Internal != nil {
|
|
nextLimbs = append(nextLimbs, child.Internal)
|
|
} else {
|
|
confirmedTotal = confirmedTotal.Add(
|
|
confirmedTotal,
|
|
new(big.Int).SetUint64(child.External.Total),
|
|
)
|
|
if bytes.Equal(
|
|
child.External.Key,
|
|
addrBytes,
|
|
) {
|
|
ownedTotal = ownedTotal.Add(
|
|
ownedTotal,
|
|
new(big.Int).SetUint64(child.External.Total),
|
|
)
|
|
}
|
|
if bytes.Equal(
|
|
child.External.Key,
|
|
peerAddrBytes,
|
|
) {
|
|
ownedTotal = ownedTotal.Add(
|
|
ownedTotal,
|
|
new(big.Int).SetUint64(child.External.Total),
|
|
)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
limbs = nextLimbs
|
|
}
|
|
|
|
if err != nil {
|
|
return nil, errors.Wrap(err, "get token info")
|
|
}
|
|
|
|
// 1 QUIL = 0x1DCD65000 units
|
|
conversionFactor, ok := new(big.Int).SetString("1DCD65000", 16)
|
|
if !ok {
|
|
return nil, errors.Wrap(err, "get token info")
|
|
}
|
|
|
|
confirmedTotal = confirmedTotal.Mul(confirmedTotal, conversionFactor)
|
|
ownedTotal = ownedTotal.Mul(ownedTotal, conversionFactor)
|
|
|
|
return &protobufs.TokenInfoResponse{
|
|
ConfirmedTokenSupply: confirmedTotal.FillBytes(make([]byte, 32)),
|
|
UnconfirmedTokenSupply: confirmedTotal.FillBytes(make([]byte, 32)),
|
|
OwnedTokens: ownedTotal.FillBytes(make([]byte, 32)),
|
|
UnconfirmedOwnedTokens: ownedTotal.FillBytes(make([]byte, 32)),
|
|
}, nil
|
|
}
|
|
|
|
func (r *RPCServer) GetPeerManifests(
|
|
ctx context.Context,
|
|
req *protobufs.GetPeerManifestsRequest,
|
|
) (*protobufs.PeerManifestsResponse, error) {
|
|
return r.masterClock.GetPeerManifests(), nil
|
|
}
|
|
|
|
func NewRPCServer(
|
|
listenAddrGRPC string,
|
|
listenAddrHTTP string,
|
|
logger *zap.Logger,
|
|
clockStore store.ClockStore,
|
|
keyManager keys.KeyManager,
|
|
pubSub p2p.PubSub,
|
|
masterClock *master.MasterClockConsensusEngine,
|
|
executionEngines []execution.ExecutionEngine,
|
|
) (*RPCServer, error) {
|
|
return &RPCServer{
|
|
listenAddrGRPC: listenAddrGRPC,
|
|
listenAddrHTTP: listenAddrHTTP,
|
|
logger: logger,
|
|
clockStore: clockStore,
|
|
keyManager: keyManager,
|
|
pubSub: pubSub,
|
|
masterClock: masterClock,
|
|
executionEngines: executionEngines,
|
|
}, nil
|
|
}
|
|
|
|
func (r *RPCServer) Start() error {
|
|
s := grpc.NewServer(
|
|
grpc.MaxRecvMsgSize(600*1024*1024),
|
|
grpc.MaxSendMsgSize(600*1024*1024),
|
|
)
|
|
protobufs.RegisterNodeServiceServer(s, r)
|
|
reflection.Register(s)
|
|
|
|
mg, err := multiaddr.NewMultiaddr(r.listenAddrGRPC)
|
|
if err != nil {
|
|
return errors.Wrap(err, "start")
|
|
}
|
|
|
|
lis, err := mn.Listen(mg)
|
|
if err != nil {
|
|
return errors.Wrap(err, "start")
|
|
}
|
|
|
|
go func() {
|
|
if err := s.Serve(mn.NetListener(lis)); err != nil {
|
|
panic(err)
|
|
}
|
|
}()
|
|
|
|
if r.listenAddrHTTP != "" {
|
|
m, err := multiaddr.NewMultiaddr(r.listenAddrHTTP)
|
|
if err != nil {
|
|
return errors.Wrap(err, "start")
|
|
}
|
|
|
|
ma, err := mn.ToNetAddr(m)
|
|
if err != nil {
|
|
return errors.Wrap(err, "start")
|
|
}
|
|
|
|
mga, err := mn.ToNetAddr(mg)
|
|
if err != nil {
|
|
return errors.Wrap(err, "start")
|
|
}
|
|
|
|
go func() {
|
|
mux := runtime.NewServeMux()
|
|
opts := []grpc.DialOption{
|
|
grpc.WithTransportCredentials(insecure.NewCredentials()),
|
|
grpc.WithDefaultCallOptions(
|
|
grpc.MaxCallRecvMsgSize(600*1024*1024),
|
|
grpc.MaxCallSendMsgSize(600*1024*1024),
|
|
),
|
|
}
|
|
|
|
if err := protobufs.RegisterNodeServiceHandlerFromEndpoint(
|
|
context.Background(),
|
|
mux,
|
|
mga.String(),
|
|
opts,
|
|
); err != nil {
|
|
panic(err)
|
|
}
|
|
|
|
if err := http.ListenAndServe(ma.String(), mux); err != nil {
|
|
panic(err)
|
|
}
|
|
}()
|
|
}
|
|
|
|
return nil
|
|
}
|