2024-02-09 07:48:44 +00:00
|
|
|
// TODO: Generate randomized RPC credentials for all services
|
|
|
|
// TODO: Generate keys for a validator and the infra
|
|
|
|
|
|
|
|
use core::ops::Deref;
|
2024-03-24 02:22:24 +00:00
|
|
|
use std::{
|
2024-03-24 03:13:33 +00:00
|
|
|
collections::{HashSet, HashMap},
|
2024-03-24 02:22:24 +00:00
|
|
|
env,
|
|
|
|
path::PathBuf,
|
|
|
|
io::Write,
|
|
|
|
fs,
|
|
|
|
process::{Stdio, Command},
|
|
|
|
};
|
2024-02-09 07:48:44 +00:00
|
|
|
|
|
|
|
use zeroize::Zeroizing;
|
|
|
|
|
|
|
|
use rand_core::{RngCore, SeedableRng, OsRng};
|
|
|
|
use rand_chacha::ChaCha20Rng;
|
|
|
|
|
|
|
|
use transcript::{Transcript, RecommendedTranscript};
|
|
|
|
|
|
|
|
use ciphersuite::{
|
|
|
|
group::{
|
|
|
|
ff::{Field, PrimeField},
|
|
|
|
GroupEncoding,
|
|
|
|
},
|
|
|
|
Ciphersuite, Ristretto,
|
|
|
|
};
|
|
|
|
|
|
|
|
mod mimalloc;
|
|
|
|
use mimalloc::mimalloc;
|
|
|
|
|
|
|
|
mod coins;
|
|
|
|
use coins::*;
|
|
|
|
|
|
|
|
mod message_queue;
|
|
|
|
use message_queue::message_queue;
|
|
|
|
|
|
|
|
mod processor;
|
|
|
|
use processor::processor;
|
|
|
|
|
|
|
|
mod coordinator;
|
|
|
|
use coordinator::coordinator;
|
|
|
|
|
|
|
|
mod serai;
|
|
|
|
use serai::serai;
|
|
|
|
|
|
|
|
mod docker;
|
|
|
|
|
|
|
|
#[global_allocator]
|
|
|
|
static ALLOCATOR: zalloc::ZeroizingAlloc<std::alloc::System> =
|
|
|
|
zalloc::ZeroizingAlloc(std::alloc::System);
|
|
|
|
|
|
|
|
#[derive(Clone, Copy, PartialEq, Eq, Debug, PartialOrd, Ord, Hash)]
|
|
|
|
pub enum Network {
|
|
|
|
Dev,
|
|
|
|
Testnet,
|
|
|
|
}
|
|
|
|
|
|
|
|
impl Network {
|
|
|
|
pub fn db(&self) -> &'static str {
|
|
|
|
match self {
|
|
|
|
Network::Dev => "parity-db",
|
|
|
|
Network::Testnet => "rocksdb",
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn release(&self) -> bool {
|
|
|
|
match self {
|
|
|
|
Network::Dev => false,
|
|
|
|
Network::Testnet => true,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn label(&self) -> &'static str {
|
|
|
|
match self {
|
|
|
|
Network::Dev => "dev",
|
|
|
|
Network::Testnet => "testnet",
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Clone, Copy, PartialEq, Eq, Debug, PartialOrd, Ord, Hash)]
|
|
|
|
enum Os {
|
|
|
|
Alpine,
|
|
|
|
Debian,
|
|
|
|
}
|
|
|
|
|
|
|
|
fn os(os: Os, additional_root: &str, user: &str) -> String {
|
|
|
|
match os {
|
|
|
|
Os::Alpine => format!(
|
|
|
|
r#"
|
|
|
|
FROM alpine:latest as image
|
|
|
|
|
|
|
|
COPY --from=mimalloc-alpine libmimalloc.so /usr/lib
|
|
|
|
ENV LD_PRELOAD=libmimalloc.so
|
|
|
|
|
|
|
|
RUN apk update && apk upgrade
|
|
|
|
|
2024-03-24 04:03:32 +00:00
|
|
|
RUN adduser --system --shell /sbin/nologin --disabled-password {user}
|
2024-03-24 04:18:40 +00:00
|
|
|
RUN addgroup {user}
|
2024-03-24 04:03:32 +00:00
|
|
|
RUN addgroup {user} {user}
|
2024-02-09 07:48:44 +00:00
|
|
|
|
2024-03-24 02:17:43 +00:00
|
|
|
# Make the /volume directory and transfer it to the user
|
|
|
|
RUN mkdir /volume && chown {user}:{user} /volume
|
|
|
|
|
2024-02-09 07:48:44 +00:00
|
|
|
{additional_root}
|
|
|
|
|
|
|
|
# Switch to a non-root user
|
|
|
|
USER {user}
|
|
|
|
|
|
|
|
WORKDIR /home/{user}
|
|
|
|
"#
|
|
|
|
),
|
|
|
|
|
|
|
|
Os::Debian => format!(
|
|
|
|
r#"
|
|
|
|
FROM debian:bookworm-slim as image
|
|
|
|
|
|
|
|
COPY --from=mimalloc-debian libmimalloc.so /usr/lib
|
|
|
|
RUN echo "/usr/lib/libmimalloc.so" >> /etc/ld.so.preload
|
|
|
|
|
|
|
|
RUN apt update && apt upgrade -y && apt autoremove -y && apt clean
|
|
|
|
|
2024-03-24 04:03:32 +00:00
|
|
|
RUN useradd --system --user-group --create-home --shell /sbin/nologin {user}
|
2024-02-09 07:48:44 +00:00
|
|
|
|
2024-03-24 02:17:43 +00:00
|
|
|
# Make the /volume directory and transfer it to the user
|
|
|
|
RUN mkdir /volume && chown {user}:{user} /volume
|
|
|
|
|
2024-02-09 07:48:44 +00:00
|
|
|
{additional_root}
|
|
|
|
|
|
|
|
# Switch to a non-root user
|
|
|
|
USER {user}
|
|
|
|
|
|
|
|
WORKDIR /home/{user}
|
|
|
|
"#
|
|
|
|
),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fn build_serai_service(release: bool, features: &str, package: &str) -> String {
|
|
|
|
let profile = if release { "release" } else { "debug" };
|
|
|
|
let profile_flag = if release { "--release" } else { "" };
|
|
|
|
|
|
|
|
format!(
|
|
|
|
r#"
|
2024-03-22 00:05:34 +00:00
|
|
|
FROM rust:1.77-slim-bookworm as builder
|
2024-02-09 07:48:44 +00:00
|
|
|
|
|
|
|
COPY --from=mimalloc-debian libmimalloc.so /usr/lib
|
|
|
|
RUN echo "/usr/lib/libmimalloc.so" >> /etc/ld.so.preload
|
|
|
|
|
|
|
|
RUN apt update && apt upgrade -y && apt autoremove -y && apt clean
|
|
|
|
|
|
|
|
# Add dev dependencies
|
|
|
|
RUN apt install -y pkg-config clang
|
|
|
|
|
|
|
|
# Dependencies for the Serai node
|
|
|
|
RUN apt install -y make protobuf-compiler
|
|
|
|
|
|
|
|
# Add the wasm toolchain
|
|
|
|
RUN rustup target add wasm32-unknown-unknown
|
|
|
|
|
|
|
|
# Add files for build
|
|
|
|
ADD patches /serai/patches
|
|
|
|
ADD common /serai/common
|
|
|
|
ADD crypto /serai/crypto
|
|
|
|
ADD coins /serai/coins
|
|
|
|
ADD message-queue /serai/message-queue
|
|
|
|
ADD processor /serai/processor
|
|
|
|
ADD coordinator /serai/coordinator
|
|
|
|
ADD substrate /serai/substrate
|
|
|
|
ADD orchestration/Cargo.toml /serai/orchestration/Cargo.toml
|
|
|
|
ADD orchestration/src /serai/orchestration/src
|
|
|
|
ADD mini /serai/mini
|
|
|
|
ADD tests /serai/tests
|
|
|
|
ADD Cargo.toml /serai
|
|
|
|
ADD Cargo.lock /serai
|
|
|
|
ADD AGPL-3.0 /serai
|
|
|
|
|
|
|
|
WORKDIR /serai
|
|
|
|
|
|
|
|
# Mount the caches and build
|
|
|
|
RUN --mount=type=cache,target=/root/.cargo \
|
|
|
|
--mount=type=cache,target=/usr/local/cargo/registry \
|
|
|
|
--mount=type=cache,target=/usr/local/cargo/git \
|
|
|
|
--mount=type=cache,target=/serai/target \
|
|
|
|
mkdir /serai/bin && \
|
|
|
|
cargo build {profile_flag} --features "{features}" -p {package} && \
|
|
|
|
mv /serai/target/{profile}/{package} /serai/bin
|
|
|
|
"#
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn write_dockerfile(path: PathBuf, dockerfile: &str) {
|
|
|
|
if let Ok(existing) = fs::read_to_string(&path).as_ref() {
|
|
|
|
if existing == dockerfile {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
fs::File::create(path).unwrap().write_all(dockerfile.as_bytes()).unwrap();
|
|
|
|
}
|
|
|
|
|
|
|
|
fn orchestration_path(network: Network) -> PathBuf {
|
|
|
|
let mut repo_path = env::current_exe().unwrap();
|
|
|
|
repo_path.pop();
|
|
|
|
assert!(repo_path.as_path().ends_with("debug"));
|
|
|
|
repo_path.pop();
|
|
|
|
assert!(repo_path.as_path().ends_with("target"));
|
|
|
|
repo_path.pop();
|
|
|
|
|
|
|
|
let mut orchestration_path = repo_path.clone();
|
|
|
|
orchestration_path.push("orchestration");
|
|
|
|
orchestration_path.push(network.label());
|
|
|
|
orchestration_path
|
|
|
|
}
|
|
|
|
|
2024-03-24 03:13:33 +00:00
|
|
|
type InfrastructureKeys =
|
|
|
|
HashMap<&'static str, (Zeroizing<<Ristretto as Ciphersuite>::F>, <Ristretto as Ciphersuite>::G)>;
|
|
|
|
fn infrastructure_keys(network: Network) -> InfrastructureKeys {
|
|
|
|
// Generate entropy for the infrastructure keys
|
|
|
|
|
|
|
|
let entropy = if network == Network::Dev {
|
|
|
|
// Don't use actual entropy if this is a dev environment
|
|
|
|
Zeroizing::new([0; 32])
|
|
|
|
} else {
|
|
|
|
let path = home::home_dir()
|
|
|
|
.unwrap()
|
|
|
|
.join(".serai")
|
|
|
|
.join(network.label())
|
|
|
|
.join("infrastructure_keys_entropy");
|
|
|
|
// Check if there's existing entropy
|
|
|
|
if let Ok(entropy) = fs::read(&path).map(Zeroizing::new) {
|
|
|
|
assert_eq!(entropy.len(), 32, "entropy saved to disk wasn't 32 bytes");
|
|
|
|
let mut res = Zeroizing::new([0; 32]);
|
|
|
|
res.copy_from_slice(entropy.as_ref());
|
|
|
|
res
|
|
|
|
} else {
|
|
|
|
// If there isn't, generate fresh entropy
|
|
|
|
let mut res = Zeroizing::new([0; 32]);
|
|
|
|
OsRng.fill_bytes(res.as_mut());
|
|
|
|
fs::write(&path, &res).unwrap();
|
|
|
|
res
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
let mut transcript =
|
|
|
|
RecommendedTranscript::new(b"Serai Orchestrator Infrastructure Keys Transcript");
|
|
|
|
transcript.append_message(b"network", network.label().as_bytes());
|
|
|
|
transcript.append_message(b"entropy", entropy);
|
|
|
|
let mut rng = ChaCha20Rng::from_seed(transcript.rng_seed(b"infrastructure_keys"));
|
|
|
|
|
|
|
|
let mut key_pair = || {
|
|
|
|
let key = Zeroizing::new(<Ristretto as Ciphersuite>::F::random(&mut rng));
|
|
|
|
let public = Ristretto::generator() * key.deref();
|
|
|
|
(key, public)
|
|
|
|
};
|
|
|
|
|
|
|
|
HashMap::from([
|
|
|
|
("coordinator", key_pair()),
|
|
|
|
("bitcoin", key_pair()),
|
|
|
|
("ethereum", key_pair()),
|
|
|
|
("monero", key_pair()),
|
|
|
|
])
|
|
|
|
}
|
|
|
|
|
2024-02-09 07:48:44 +00:00
|
|
|
fn dockerfiles(network: Network) {
|
|
|
|
let orchestration_path = orchestration_path(network);
|
|
|
|
|
|
|
|
bitcoin(&orchestration_path, network);
|
|
|
|
ethereum(&orchestration_path);
|
|
|
|
monero(&orchestration_path, network);
|
|
|
|
if network == Network::Dev {
|
|
|
|
monero_wallet_rpc(&orchestration_path);
|
|
|
|
}
|
|
|
|
|
2024-03-24 03:13:33 +00:00
|
|
|
let mut infrastructure_keys = infrastructure_keys(network);
|
|
|
|
let coordinator_key = infrastructure_keys.remove("coordinator").unwrap();
|
|
|
|
let bitcoin_key = infrastructure_keys.remove("bitcoin").unwrap();
|
|
|
|
let ethereum_key = infrastructure_keys.remove("ethereum").unwrap();
|
|
|
|
let monero_key = infrastructure_keys.remove("monero").unwrap();
|
2024-02-09 07:48:44 +00:00
|
|
|
|
|
|
|
message_queue(
|
|
|
|
&orchestration_path,
|
|
|
|
network,
|
|
|
|
coordinator_key.1,
|
|
|
|
bitcoin_key.1,
|
|
|
|
ethereum_key.1,
|
|
|
|
monero_key.1,
|
|
|
|
);
|
|
|
|
|
2024-03-24 03:13:33 +00:00
|
|
|
let new_entropy = || {
|
2024-02-09 07:48:44 +00:00
|
|
|
let mut res = Zeroizing::new([0; 32]);
|
2024-03-24 03:13:33 +00:00
|
|
|
OsRng.fill_bytes(res.as_mut());
|
2024-02-09 07:48:44 +00:00
|
|
|
res
|
|
|
|
};
|
|
|
|
processor(
|
|
|
|
&orchestration_path,
|
|
|
|
network,
|
|
|
|
"bitcoin",
|
|
|
|
coordinator_key.1,
|
|
|
|
bitcoin_key.0,
|
|
|
|
new_entropy(),
|
|
|
|
);
|
|
|
|
processor(
|
|
|
|
&orchestration_path,
|
|
|
|
network,
|
|
|
|
"ethereum",
|
|
|
|
coordinator_key.1,
|
|
|
|
ethereum_key.0,
|
|
|
|
new_entropy(),
|
|
|
|
);
|
|
|
|
processor(&orchestration_path, network, "monero", coordinator_key.1, monero_key.0, new_entropy());
|
|
|
|
|
|
|
|
let serai_key = {
|
|
|
|
let serai_key = Zeroizing::new(
|
|
|
|
fs::read(home::home_dir().unwrap().join(".serai").join(network.label()).join("key"))
|
|
|
|
.expect("couldn't read key for this network"),
|
|
|
|
);
|
|
|
|
let mut serai_key_repr =
|
|
|
|
Zeroizing::new(<<Ristretto as Ciphersuite>::F as PrimeField>::Repr::default());
|
|
|
|
serai_key_repr.as_mut().copy_from_slice(serai_key.as_ref());
|
|
|
|
Zeroizing::new(<Ristretto as Ciphersuite>::F::from_repr(*serai_key_repr).unwrap())
|
|
|
|
};
|
|
|
|
|
2024-03-22 20:06:56 +00:00
|
|
|
coordinator(&orchestration_path, network, coordinator_key.0, &serai_key);
|
2024-02-09 07:48:44 +00:00
|
|
|
|
2024-03-22 20:06:56 +00:00
|
|
|
serai(&orchestration_path, network, &serai_key);
|
2024-02-09 07:48:44 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
fn key_gen(network: Network) {
|
|
|
|
let serai_dir = home::home_dir().unwrap().join(".serai").join(network.label());
|
|
|
|
let key_file = serai_dir.join("key");
|
|
|
|
if fs::File::open(&key_file).is_ok() {
|
|
|
|
println!("already created key");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
let key = <Ristretto as Ciphersuite>::F::random(&mut OsRng);
|
|
|
|
|
|
|
|
let _ = fs::create_dir_all(&serai_dir);
|
|
|
|
fs::write(key_file, key.to_repr()).expect("couldn't write key");
|
|
|
|
|
|
|
|
println!(
|
|
|
|
"Public Key: {}",
|
|
|
|
hex::encode((<Ristretto as Ciphersuite>::generator() * key).to_bytes())
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
fn start(network: Network, services: HashSet<String>) {
|
|
|
|
// Create the serai network
|
|
|
|
Command::new("docker")
|
|
|
|
.arg("network")
|
|
|
|
.arg("create")
|
|
|
|
.arg("--driver")
|
|
|
|
.arg("bridge")
|
|
|
|
.arg("serai")
|
|
|
|
.output()
|
|
|
|
.unwrap();
|
|
|
|
|
|
|
|
for service in services {
|
|
|
|
println!("Starting {service}");
|
|
|
|
let name = match service.as_ref() {
|
|
|
|
"serai" => "serai",
|
|
|
|
"coordinator" => "coordinator",
|
|
|
|
"message-queue" => "message-queue",
|
|
|
|
"bitcoin-daemon" => "bitcoin",
|
|
|
|
"bitcoin-processor" => "bitcoin-processor",
|
|
|
|
"monero-daemon" => "monero",
|
|
|
|
"monero-processor" => "monero-processor",
|
|
|
|
"monero-wallet-rpc" => "monero-wallet-rpc",
|
|
|
|
_ => panic!("starting unrecognized service"),
|
|
|
|
};
|
|
|
|
|
2024-03-22 06:19:09 +00:00
|
|
|
// If we're building the Serai service, first build the runtime
|
|
|
|
let serai_runtime_volume = format!("serai-{}-runtime-volume", network.label());
|
|
|
|
if name == "serai" {
|
|
|
|
// Check if it's built by checking if the volume has the expected runtime file
|
|
|
|
let built = || {
|
|
|
|
if let Ok(path) = Command::new("docker")
|
|
|
|
.arg("volume")
|
|
|
|
.arg("inspect")
|
|
|
|
.arg("-f")
|
|
|
|
.arg("{{ .Mountpoint }}")
|
|
|
|
.arg(&serai_runtime_volume)
|
|
|
|
.output()
|
|
|
|
{
|
|
|
|
if let Ok(path) = String::from_utf8(path.stdout) {
|
|
|
|
if let Ok(iter) = std::fs::read_dir(PathBuf::from(path.trim())) {
|
|
|
|
for item in iter.flatten() {
|
|
|
|
if item.file_name() == "serai.wasm" {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
false
|
|
|
|
};
|
|
|
|
|
|
|
|
if !built() {
|
|
|
|
let mut repo_path = env::current_exe().unwrap();
|
|
|
|
repo_path.pop();
|
|
|
|
if repo_path.as_path().ends_with("deps") {
|
|
|
|
repo_path.pop();
|
|
|
|
}
|
|
|
|
assert!(repo_path.as_path().ends_with("debug") || repo_path.as_path().ends_with("release"));
|
|
|
|
repo_path.pop();
|
|
|
|
assert!(repo_path.as_path().ends_with("target"));
|
|
|
|
repo_path.pop();
|
|
|
|
|
|
|
|
// Build the image to build the runtime
|
|
|
|
if !Command::new("docker")
|
|
|
|
.current_dir(&repo_path)
|
|
|
|
.arg("build")
|
|
|
|
.arg("-f")
|
|
|
|
.arg("orchestration/runtime/Dockerfile")
|
|
|
|
.arg(".")
|
|
|
|
.arg("-t")
|
|
|
|
.arg(format!("serai-{}-runtime-img", network.label()))
|
|
|
|
.spawn()
|
|
|
|
.unwrap()
|
|
|
|
.wait()
|
|
|
|
.unwrap()
|
|
|
|
.success()
|
|
|
|
{
|
|
|
|
panic!("failed to build runtime image");
|
|
|
|
}
|
|
|
|
|
|
|
|
// Run the image, building the runtime
|
|
|
|
println!("Building the Serai runtime");
|
|
|
|
let container_name = format!("serai-{}-runtime", network.label());
|
|
|
|
let _ =
|
|
|
|
Command::new("docker").arg("rm").arg("-f").arg(&container_name).spawn().unwrap().wait();
|
|
|
|
let _ = Command::new("docker")
|
|
|
|
.arg("run")
|
|
|
|
.arg("--name")
|
|
|
|
.arg(container_name)
|
|
|
|
.arg("--volume")
|
|
|
|
.arg(format!("{serai_runtime_volume}:/volume"))
|
|
|
|
.arg(format!("serai-{}-runtime-img", network.label()))
|
|
|
|
.spawn();
|
|
|
|
|
|
|
|
// Wait until its built
|
|
|
|
let mut ticks = 0;
|
|
|
|
while !built() {
|
|
|
|
std::thread::sleep(core::time::Duration::from_secs(60));
|
|
|
|
ticks += 1;
|
|
|
|
if ticks > 6 * 60 {
|
|
|
|
panic!("couldn't build the runtime after 6 hours")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-02-09 07:48:44 +00:00
|
|
|
// Build it
|
|
|
|
println!("Building {service}");
|
|
|
|
docker::build(&orchestration_path(network), network, name);
|
|
|
|
|
|
|
|
let docker_name = format!("serai-{}-{name}", network.label());
|
|
|
|
let docker_image = format!("{docker_name}-img");
|
|
|
|
if !Command::new("docker")
|
|
|
|
.arg("container")
|
|
|
|
.arg("inspect")
|
|
|
|
.arg(&docker_name)
|
2024-03-24 02:17:43 +00:00
|
|
|
// Use null for all IO to silence 'container does not exist'
|
|
|
|
.stdin(Stdio::null())
|
|
|
|
.stdout(Stdio::null())
|
|
|
|
.stderr(Stdio::null())
|
2024-02-09 07:48:44 +00:00
|
|
|
.status()
|
|
|
|
.unwrap()
|
|
|
|
.success()
|
|
|
|
{
|
|
|
|
// Create the docker container
|
|
|
|
println!("Creating new container for {service}");
|
|
|
|
let volume = format!("serai-{}-{name}-volume:/volume", network.label());
|
|
|
|
let mut command = Command::new("docker");
|
|
|
|
let command = command.arg("create").arg("--name").arg(&docker_name);
|
|
|
|
let command = command.arg("--network").arg("serai");
|
2024-02-09 13:43:33 +00:00
|
|
|
let command = command.arg("--restart").arg("always");
|
2024-03-07 02:49:55 +00:00
|
|
|
let command = command.arg("--log-opt").arg("max-size=100m");
|
|
|
|
let command = command.arg("--log-opt").arg("max-file=3");
|
2024-03-24 02:17:43 +00:00
|
|
|
let command = if network == Network::Dev {
|
|
|
|
command
|
|
|
|
} else {
|
|
|
|
// Assign a persistent volume if this isn't for Dev
|
2024-03-24 02:22:24 +00:00
|
|
|
command.arg("--volume").arg(volume)
|
|
|
|
};
|
2024-02-09 07:48:44 +00:00
|
|
|
let command = match name {
|
|
|
|
"bitcoin" => {
|
2024-03-24 02:17:43 +00:00
|
|
|
// Expose the RPC for tests
|
2024-02-09 07:48:44 +00:00
|
|
|
if network == Network::Dev {
|
|
|
|
command.arg("-p").arg("8332:8332")
|
2024-03-24 02:22:24 +00:00
|
|
|
} else {
|
|
|
|
command
|
2024-02-09 07:48:44 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
"monero" => {
|
2024-03-24 02:17:43 +00:00
|
|
|
// Expose the RPC for tests
|
2024-02-09 07:48:44 +00:00
|
|
|
if network == Network::Dev {
|
|
|
|
command.arg("-p").arg("18081:18081")
|
2024-03-24 02:22:24 +00:00
|
|
|
} else {
|
|
|
|
command
|
2024-02-09 07:48:44 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
"monero-wallet-rpc" => {
|
|
|
|
assert_eq!(network, Network::Dev, "monero-wallet-rpc is only for dev");
|
2024-03-24 02:17:43 +00:00
|
|
|
// Expose the RPC for tests
|
2024-02-09 07:48:44 +00:00
|
|
|
command.arg("-p").arg("18082:18082")
|
|
|
|
}
|
2024-03-22 20:06:56 +00:00
|
|
|
"coordinator" => {
|
2024-03-24 02:17:43 +00:00
|
|
|
if network == Network::Dev {
|
2024-03-22 20:06:56 +00:00
|
|
|
command
|
2024-03-24 02:22:24 +00:00
|
|
|
} else {
|
2024-03-24 02:17:43 +00:00
|
|
|
// Publish the port
|
|
|
|
command.arg("-p").arg("30563:30563")
|
2024-03-22 20:06:56 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
"serai" => {
|
2024-03-24 02:22:24 +00:00
|
|
|
let command = command.arg("--volume").arg(format!("{serai_runtime_volume}:/runtime"));
|
2024-03-24 02:17:43 +00:00
|
|
|
if network == Network::Dev {
|
|
|
|
command
|
|
|
|
} else {
|
|
|
|
// Publish the port
|
|
|
|
command.arg("-p").arg("30333:30333")
|
2024-03-22 20:06:56 +00:00
|
|
|
}
|
|
|
|
}
|
2024-02-09 07:48:44 +00:00
|
|
|
_ => command,
|
|
|
|
};
|
|
|
|
assert!(
|
|
|
|
command.arg(docker_image).status().unwrap().success(),
|
|
|
|
"couldn't create the container"
|
|
|
|
);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Start it
|
|
|
|
// TODO: Check it successfully started
|
|
|
|
println!("Starting existing container for {service}");
|
|
|
|
let _ = Command::new("docker").arg("start").arg(docker_name).output();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fn main() {
|
|
|
|
let help = || -> ! {
|
|
|
|
println!(
|
|
|
|
r#"
|
|
|
|
Serai Orchestrator v0.0.1
|
|
|
|
|
|
|
|
Commands:
|
|
|
|
key_gen *network*
|
2024-03-24 03:13:33 +00:00
|
|
|
Generate a key for the validator.
|
2024-02-09 07:48:44 +00:00
|
|
|
|
|
|
|
setup *network*
|
2024-03-24 03:13:33 +00:00
|
|
|
Generate the Dockerfiles for every Serai service.
|
2024-02-09 07:48:44 +00:00
|
|
|
|
|
|
|
start *network* [service1, service2...]
|
|
|
|
Start the specified services for the specified network ("dev" or "testnet").
|
|
|
|
|
|
|
|
- `serai`
|
|
|
|
- `coordinator`
|
|
|
|
- `message-queue`
|
|
|
|
- `bitcoin-daemon`
|
|
|
|
- `bitcoin-processor`
|
|
|
|
- `monero-daemon`
|
|
|
|
- `monero-processor`
|
|
|
|
- `monero-wallet-rpc` (if "dev")
|
|
|
|
|
|
|
|
are valid services.
|
|
|
|
|
|
|
|
`*network*-processor` will automatically start `*network*-daemon`.
|
|
|
|
"#
|
|
|
|
);
|
|
|
|
std::process::exit(1);
|
|
|
|
};
|
|
|
|
|
|
|
|
let mut args = env::args();
|
|
|
|
args.next();
|
|
|
|
let command = args.next();
|
|
|
|
let network = match args.next().as_ref().map(AsRef::as_ref) {
|
|
|
|
Some("dev") => Network::Dev,
|
|
|
|
Some("testnet") => Network::Testnet,
|
|
|
|
Some(_) => panic!(r#"unrecognized network. only "dev" and "testnet" are recognized"#),
|
|
|
|
None => help(),
|
|
|
|
};
|
|
|
|
|
|
|
|
match command.as_ref().map(AsRef::as_ref) {
|
|
|
|
Some("key_gen") => {
|
|
|
|
key_gen(network);
|
|
|
|
}
|
|
|
|
Some("setup") => {
|
|
|
|
dockerfiles(network);
|
|
|
|
}
|
|
|
|
Some("start") => {
|
|
|
|
let mut services = HashSet::new();
|
|
|
|
for arg in args {
|
|
|
|
if let Some(ext_network) = arg.strip_suffix("-processor") {
|
|
|
|
services.insert(ext_network.to_string() + "-daemon");
|
|
|
|
}
|
|
|
|
services.insert(arg);
|
|
|
|
}
|
|
|
|
|
|
|
|
start(network, services);
|
|
|
|
}
|
|
|
|
_ => help(),
|
|
|
|
}
|
|
|
|
}
|