199 lines
5.4 KiB
Go
199 lines
5.4 KiB
Go
package rpc
|
|
|
|
import (
|
|
"bytes"
|
|
"fmt"
|
|
"net/http"
|
|
"strconv"
|
|
"strings"
|
|
|
|
"github.com/gorilla/mux"
|
|
"github.com/spf13/cobra"
|
|
"github.com/spf13/viper"
|
|
|
|
tmtypes "github.com/tendermint/tendermint/types"
|
|
|
|
"github.com/cosmos/cosmos-sdk/client"
|
|
"github.com/cosmos/cosmos-sdk/client/context"
|
|
"github.com/cosmos/cosmos-sdk/codec"
|
|
sdk "github.com/cosmos/cosmos-sdk/types"
|
|
"github.com/cosmos/cosmos-sdk/types/rest"
|
|
)
|
|
|
|
// TODO these next two functions feel kinda hacky based on their placement
|
|
|
|
//ValidatorCommand returns the validator set for a given height
|
|
func ValidatorCommand(cdc *codec.Codec) *cobra.Command {
|
|
cmd := &cobra.Command{
|
|
Use: "tendermint-validator-set [height]",
|
|
Short: "Get the full tendermint validator set at given height",
|
|
Args: cobra.MaximumNArgs(1),
|
|
RunE: func(cmd *cobra.Command, args []string) error {
|
|
var height *int64
|
|
|
|
// optional height
|
|
if len(args) > 0 {
|
|
h, err := strconv.Atoi(args[0])
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if h > 0 {
|
|
tmp := int64(h)
|
|
height = &tmp
|
|
}
|
|
}
|
|
|
|
cliCtx := context.NewCLIContext().WithCodec(cdc)
|
|
|
|
result, err := getValidators(cliCtx, height)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return cliCtx.PrintOutput(result)
|
|
},
|
|
}
|
|
|
|
cmd.Flags().StringP(client.FlagNode, "n", "tcp://localhost:26657", "Node to connect to")
|
|
viper.BindPFlag(client.FlagNode, cmd.Flags().Lookup(client.FlagNode))
|
|
cmd.Flags().Bool(client.FlagTrustNode, false, "Trust connected full node (don't verify proofs for responses)")
|
|
viper.BindPFlag(client.FlagTrustNode, cmd.Flags().Lookup(client.FlagTrustNode))
|
|
cmd.Flags().Bool(client.FlagIndentResponse, false, "indent JSON response")
|
|
viper.BindPFlag(client.FlagIndentResponse, cmd.Flags().Lookup(client.FlagIndentResponse))
|
|
|
|
return cmd
|
|
}
|
|
|
|
// Validator output in bech32 format
|
|
type ValidatorOutput struct {
|
|
Address sdk.ConsAddress `json:"address"`
|
|
PubKey string `json:"pub_key"`
|
|
ProposerPriority int64 `json:"proposer_priority"`
|
|
VotingPower int64 `json:"voting_power"`
|
|
}
|
|
|
|
// Validators at a certain height output in bech32 format
|
|
type ResultValidatorsOutput struct {
|
|
BlockHeight int64 `json:"block_height"`
|
|
Validators []ValidatorOutput `json:"validators"`
|
|
}
|
|
|
|
func (rvo ResultValidatorsOutput) String() string {
|
|
var b strings.Builder
|
|
|
|
b.WriteString(fmt.Sprintf("block height: %d\n", rvo.BlockHeight))
|
|
|
|
for _, val := range rvo.Validators {
|
|
b.WriteString(
|
|
fmt.Sprintf(`
|
|
Address: %s
|
|
Pubkey: %s
|
|
ProposerPriority: %d
|
|
VotingPower: %d
|
|
`,
|
|
val.Address, val.PubKey, val.ProposerPriority, val.VotingPower,
|
|
),
|
|
)
|
|
}
|
|
|
|
return b.String()
|
|
}
|
|
|
|
func bech32ValidatorOutput(validator *tmtypes.Validator) (ValidatorOutput, error) {
|
|
bechValPubkey, err := sdk.Bech32ifyConsPub(validator.PubKey)
|
|
if err != nil {
|
|
return ValidatorOutput{}, err
|
|
}
|
|
|
|
return ValidatorOutput{
|
|
Address: sdk.ConsAddress(validator.Address),
|
|
PubKey: bechValPubkey,
|
|
ProposerPriority: validator.ProposerPriority,
|
|
VotingPower: validator.VotingPower,
|
|
}, nil
|
|
}
|
|
|
|
func getValidators(cliCtx context.CLIContext, height *int64) (ResultValidatorsOutput, error) {
|
|
// get the node
|
|
node, err := cliCtx.GetNode()
|
|
if err != nil {
|
|
return ResultValidatorsOutput{}, err
|
|
}
|
|
|
|
validatorsRes, err := node.Validators(height)
|
|
if err != nil {
|
|
return ResultValidatorsOutput{}, err
|
|
}
|
|
|
|
if !cliCtx.TrustNode {
|
|
check, err := cliCtx.Verify(validatorsRes.BlockHeight)
|
|
if err != nil {
|
|
return ResultValidatorsOutput{}, err
|
|
}
|
|
|
|
if !bytes.Equal(check.ValidatorsHash, tmtypes.NewValidatorSet(validatorsRes.Validators).Hash()) {
|
|
return ResultValidatorsOutput{}, fmt.Errorf("received invalid validatorset")
|
|
}
|
|
}
|
|
|
|
outputValidatorsRes := ResultValidatorsOutput{
|
|
BlockHeight: validatorsRes.BlockHeight,
|
|
Validators: make([]ValidatorOutput, len(validatorsRes.Validators)),
|
|
}
|
|
|
|
for i := 0; i < len(validatorsRes.Validators); i++ {
|
|
outputValidatorsRes.Validators[i], err = bech32ValidatorOutput(validatorsRes.Validators[i])
|
|
if err != nil {
|
|
return ResultValidatorsOutput{}, err
|
|
}
|
|
}
|
|
|
|
return outputValidatorsRes, nil
|
|
}
|
|
|
|
// REST
|
|
|
|
// Validator Set at a height REST handler
|
|
func ValidatorSetRequestHandlerFn(cliCtx context.CLIContext) http.HandlerFunc {
|
|
return func(w http.ResponseWriter, r *http.Request) {
|
|
vars := mux.Vars(r)
|
|
|
|
height, err := strconv.ParseInt(vars["height"], 10, 64)
|
|
if err != nil {
|
|
rest.WriteErrorResponse(w, http.StatusBadRequest, "ERROR: Couldn't parse block height. Assumed format is '/validatorsets/{height}'.")
|
|
return
|
|
}
|
|
|
|
chainHeight, err := GetChainHeight(cliCtx)
|
|
if height > chainHeight {
|
|
rest.WriteErrorResponse(w, http.StatusNotFound, "ERROR: Requested block height is bigger then the chain length.")
|
|
return
|
|
}
|
|
|
|
output, err := getValidators(cliCtx, &height)
|
|
if err != nil {
|
|
rest.WriteErrorResponse(w, http.StatusInternalServerError, err.Error())
|
|
return
|
|
}
|
|
rest.PostProcessResponse(w, cdc, output, cliCtx.Indent)
|
|
}
|
|
}
|
|
|
|
// Latest Validator Set REST handler
|
|
func LatestValidatorSetRequestHandlerFn(cliCtx context.CLIContext) http.HandlerFunc {
|
|
return func(w http.ResponseWriter, r *http.Request) {
|
|
height, err := GetChainHeight(cliCtx)
|
|
if err != nil {
|
|
rest.WriteErrorResponse(w, http.StatusInternalServerError, err.Error())
|
|
return
|
|
}
|
|
|
|
output, err := getValidators(cliCtx, &height)
|
|
if err != nil {
|
|
rest.WriteErrorResponse(w, http.StatusInternalServerError, err.Error())
|
|
return
|
|
}
|
|
rest.PostProcessResponse(w, cdc, output, cliCtx.Indent)
|
|
}
|
|
}
|