mirror of
https://github.com/matter-labs/ansible-en-role.git
synced 2025-12-06 10:59:56 +00:00
Compare commits
78 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| 17d9ecd1ce | |||
| 5071bb3423 | |||
| fa4f00a62d | |||
| f3ce6ce204 | |||
| cd5df40065 | |||
| 4bd3805af1 | |||
| 8006ed9328 | |||
| c497fc0982 | |||
| 57f3fb74e4 | |||
| aa018348d8 | |||
| b8e3b89cf5 | |||
| d276d7b290 | |||
| 60333c40da | |||
| 2eb2b1f6d4 | |||
| 69777ac4e8 | |||
| 46e2a6e0e4 | |||
| c5ab63672b | |||
| 22a1d06ef7 | |||
| 655b461ba5 | |||
| 45feed1069 | |||
| 5298e9f87d | |||
| 576f8eb252 | |||
| b672d803f0 | |||
| 5e8657ac3b | |||
| 4f1b6a37ab | |||
| 9034dc5fd4 | |||
| dac0b0cc80 | |||
| 10ea272736 | |||
| 3fa5c8622b | |||
| 64198202a5 | |||
| 0d1717f38a | |||
| 13ef869339 | |||
| cfbaed74f0 | |||
| 6f1e025785 | |||
| f347a9173e | |||
| 2bf98e9273 | |||
| dde435ca95 | |||
| 8d085aa960 | |||
| b85a7d5c65 | |||
| 6a3c8cb263 | |||
| ed4feb99bc | |||
| 605525c7ba | |||
| 5bdeb0fcfa | |||
| bf186104d4 | |||
| 493e5ceffc | |||
| 7a77daacf3 | |||
| 8290a1cd9b | |||
| 191ebeced5 | |||
| 0cdbf98bf1 | |||
| ce94f307e7 | |||
| 9a8b0af6c3 | |||
| 7500e2b2da | |||
| ace0df965b | |||
| e8d79755da | |||
| 160f497294 | |||
| cdf5deb718 | |||
| cbf199a152 | |||
| c8a8c1b76c | |||
| 7fcf8ab7b6 | |||
| 2c04aabc1a | |||
| 875c50be71 | |||
| 135adfdeb6 | |||
| 0ed6245a1d | |||
| a240fac3ec | |||
| eed88e8b72 | |||
| 47edb8a161 | |||
| d5c66009cb | |||
| 437b174a25 | |||
| 842af18f5c | |||
| 7f2102550b | |||
| a3836b82bf | |||
| eecc3a5037 | |||
| d8efb3971e | |||
| f0e128860c | |||
| 5df4c691bb | |||
| 69435131f7 | |||
| 281068a752 | |||
| 97a71926d7 |
@ -2,3 +2,6 @@ skip_list:
|
||||
- 'yaml'
|
||||
- 'risky-shell-pipe'
|
||||
- 'role-name'
|
||||
|
||||
exclude_paths:
|
||||
- example_playbooks
|
||||
|
||||
3
.github/ISSUE_TEMPLATE/bug_report.md
vendored
3
.github/ISSUE_TEMPLATE/bug_report.md
vendored
@ -27,9 +27,10 @@ Describe what actually happened.
|
||||
#### 🖥️ Environment
|
||||
|
||||
Any relevant environment details like:
|
||||
|
||||
* Ansible version
|
||||
* Operating system
|
||||
* External node version
|
||||
* External Node version
|
||||
|
||||
#### 📋 Additional Context
|
||||
|
||||
|
||||
@ -5,7 +5,7 @@ sovereignty! We welcome contributions from anyone on the internet, and are grate
|
||||
|
||||
## Ways to contribute
|
||||
|
||||
There are many ways to contribute to the external node role:
|
||||
There are many ways to contribute to the External Node role:
|
||||
|
||||
1. Open issues: if you find a bug, have something you believe needs to be fixed, or have an idea for a feature, please
|
||||
open an issue.
|
||||
|
||||
40
README.md
40
README.md
@ -14,7 +14,9 @@ This role has been tested on:
|
||||
|
||||
## Usage
|
||||
|
||||
Minimal required variables that has to be set:
|
||||
For a very simple minimal working example, see example_playbooks directory
|
||||
|
||||
Minimal required variables that have to be set:
|
||||
|
||||
```yaml
|
||||
database_name: ""
|
||||
@ -26,6 +28,15 @@ l1_chain_id: ""
|
||||
l2_chain_id: ""
|
||||
```
|
||||
|
||||
Additional arbitrary environment variables can be passed to External Node container:
|
||||
|
||||
```yaml
|
||||
additional_env_vars:
|
||||
- { name: "EN_ADDITIONAL_VAR1", value: "Value1" }
|
||||
- { name: "EN_ADDITIONAL_VAR2", value: "Value2" }
|
||||
- { name: "EN_ADDITIONAL_VAR3", value: "Value3" }
|
||||
```
|
||||
|
||||
Please refer to [External Node docs](https://github.com/matter-labs/zksync-era/tree/main/docs/guides/external-node/prepared_configs) to find values for different zkSync Era chains.
|
||||
|
||||
If you want to use monitoring (which we highly recommend), you have to change these variables:
|
||||
@ -73,7 +84,6 @@ We recommend using pgtune [online](https://pgtune.leopard.in.ua/) or [self-hoste
|
||||
If you want to use basic auth for inbound requests, you have to change next variables:
|
||||
|
||||
```yaml
|
||||
# Enable basic auth for external node
|
||||
enable_basic_auth: true
|
||||
basic_auth_secret: "htpasswd-generated-secret"
|
||||
```
|
||||
@ -87,20 +97,21 @@ Basic auth secret can be generated by `htpasswd` and `sed` for interpolation:
|
||||
`ansible-galaxy collection install community.general`
|
||||
|
||||
2. Prepare the latest database backup on your host. you can download it from our public GCS buckets:
|
||||
Skip this step if you are recovering from a snapshot!
|
||||
|
||||
* [Era Mainnet latest dump](https://storage.googleapis.com/zksync-era-mainnet-external-node-backups/external_node_latest.pgdump)
|
||||
* [Era Sepolia Testnet latest dump](https://storage.googleapis.com/zksync-era-boojnet-external-node-snapshots/external_node_latest.pgdump)
|
||||
* [Era Goerli Testnet latest dump](https://storage.googleapis.com/zksync-era-testnet-external-node-backups/external_node_latest.pgdump)
|
||||
* [Era Mainnet latest dump](https://en-backups.matterlabs.dev/)
|
||||
* [Era Sepolia Testnet latest dump](https://storage.googleapis.com/zksync-era-testnet-sepolia-external-node-backups/external_node_latest.pgdump)
|
||||
|
||||
Downloaded dump file should be placed into `{{ storage_directory }}/pg_backups` directory (`/usr/src/en/pg_backups` by default)
|
||||
Downloaded dump, if needed, should be unarchived and named `external_node_latest.pgdump`. File should be placed into `{{ storage_directory }}/pg_backups` directory (`/usr/src/en/pg_backups` by default).
|
||||
|
||||
3. **OPTIONAL**: If you already have running node, you can copy its tree and state directory to a new host's `{{ storage_directory }}/db`. (`/usr/src/en/db` by default)
|
||||
Skip this step if you are recovering from a snapshot!
|
||||
|
||||
**Keep in mind that tree and state should be older than PostgreSQL database backup.**
|
||||
|
||||
4. Run ansible-playbook using this role. We recommend encrypting next variables with ansible-vault or some another way:
|
||||
|
||||
```
|
||||
```yaml
|
||||
database_username
|
||||
database_password
|
||||
eth_l1_url
|
||||
@ -110,6 +121,20 @@ vm_auth_password
|
||||
|
||||
5. Connect to your host, and see status of `postgres` container. It can take a lot of time before PostgreSQL database backup will be restored (hours to days, depending on your disk throughput and IOPS), after which PostgreSQL server will be ready for use. Once `postgres` becomes "healthy", `external_node` runs automatically.
|
||||
|
||||
## Snapshots Recovery
|
||||
|
||||
Example config enabling recovery from a snapshot:
|
||||
|
||||
```yaml
|
||||
- enable_snapshots_recovery: true
|
||||
- snapshots_bucket_base_url: "snapshots-bucket-name"
|
||||
```
|
||||
|
||||
Snapshot buckets:
|
||||
|
||||
* Era Mainnet: `zksync-era-mainnet-external-node-snapshots`
|
||||
* Era Sepolia Testnet: `zksync-era-boojnet-external-node-snapshots`
|
||||
|
||||
## Example Playbook
|
||||
|
||||
```yaml
|
||||
@ -125,7 +150,6 @@ vm_auth_password
|
||||
l2_chain_id: "324"
|
||||
l1_chain_id: "1"
|
||||
enable_tls: false
|
||||
partner_id: matterlabs
|
||||
vars_files:
|
||||
- secrets/mainnet_secrets.yml
|
||||
roles:
|
||||
|
||||
@ -8,11 +8,12 @@ docker_install_compose: true
|
||||
docker_version: "25.0.3"
|
||||
docker_compose_version: "v2.23.0"
|
||||
|
||||
# Versions of external node and 3rd party components
|
||||
# Versions of External Node and 3rd party components
|
||||
traefik_version: 2.11
|
||||
postgres_version: 14
|
||||
external_node_version: 21.0.2
|
||||
vmagent_version: 1.95.1
|
||||
external_node_version: 27.2.0
|
||||
external_node_raw_docker_tag: ""
|
||||
vmagent_version: 1.100.1
|
||||
cadvisor_version: 0.47.2
|
||||
postgres_exporter_version: 0.15.0
|
||||
|
||||
@ -55,20 +56,43 @@ postgres_arguments:
|
||||
- max_parallel_maintenance_workers=4
|
||||
- -c
|
||||
- checkpoint_timeout=1800
|
||||
enable_postgres_replication: false
|
||||
# IP address of the interface replication
|
||||
postgres_replications_arguments: []
|
||||
postgres_replica_user_name: ""
|
||||
postgres_replica_user_password: ""
|
||||
postgres_replica_auth_method: "scram-sha-256"
|
||||
postgres_replication_bind_address: ""
|
||||
postgres_replica_address: ""
|
||||
backup_db_user: ""
|
||||
backup_db_password: ""
|
||||
backup_db_name: ""
|
||||
|
||||
# Enable TLS for traefik
|
||||
enable_tls: false
|
||||
acme_email: ""
|
||||
domain_name: ""
|
||||
|
||||
# Enable basic auth for external node
|
||||
# Enable basic auth for External Node
|
||||
enable_basic_auth: false
|
||||
basic_auth_secret: ""
|
||||
|
||||
# Force restore pg database
|
||||
force_pg_restore: false
|
||||
|
||||
# External node and database options
|
||||
# Use a snapshot to recover
|
||||
enable_snapshots_recovery: false
|
||||
snapshots_bucket_base_url: ""
|
||||
|
||||
# https://github.com/matter-labs/zksync-era/blob/main/docs/guides/external-node/09_decentralization.md
|
||||
enable_consensus: false
|
||||
consensus_secrets_file: ""
|
||||
consensus_port: 3054
|
||||
consensus_debug_port_enabled: false
|
||||
consensus_debug_port: 5000
|
||||
consensus_outbound: []
|
||||
|
||||
# External Node and database options
|
||||
database_name: ""
|
||||
database_username: ""
|
||||
database_password: ""
|
||||
@ -80,7 +104,10 @@ rpc_http_port: 3060
|
||||
rpc_ws_port: 3061
|
||||
healthcheck_port: 3081
|
||||
metrics_port: 3082
|
||||
log_verbosity: info
|
||||
rust_log: zksync_external_node=info,zksync_core=info,zksync_core::sync_layer=info,zksync_server=info,zksync_prover=info,zksync_contract_verifier=info,zksync_dal=info,zksync_eth_client=info,zksync_storage=info,zksync_db_manager=info,zksync_merkle_tree=info,zksync_state=info,zksync_utils=info,zksync_types=info,loadnext=info,dev_ticker=info,vm=info,block_sizes_test=info,zksync_verification_key_generator_and_server=info,zksync_object_store=info,setup_key_generator_and_server=info,zksync_circuit_synthesizer=info,zksync_queued_job_processor=info,zksync_health_check=info
|
||||
|
||||
# Additional env vars passed to External Node
|
||||
additional_env_vars: []
|
||||
|
||||
# Monitoring options section
|
||||
enable_monitoring: false
|
||||
|
||||
23
example_playbooks/mainnet_with_snapshots_recovery/README.md
Normal file
23
example_playbooks/mainnet_with_snapshots_recovery/README.md
Normal file
@ -0,0 +1,23 @@
|
||||
# Mainnet Snapshots Recovery playbook
|
||||
|
||||
This directory is simple example how to set up EN using this role. It comes with snapshots recovery enabled by default.\
|
||||
**Note that for simplicity it's using postgres database
|
||||
with a very unsecure password and the EN is just started on the same machine**
|
||||
|
||||
To run this playbook, first install dependencies
|
||||
|
||||
```shell
|
||||
ansible-galaxy install -r requirements.yml
|
||||
```
|
||||
|
||||
and then you can run the playbook using
|
||||
|
||||
```shell
|
||||
ansible-playbook playbook.yml -i hosts.ini -K
|
||||
```
|
||||
|
||||
To see logs you can use
|
||||
|
||||
```shell
|
||||
docker logs en-external_node-1
|
||||
```
|
||||
@ -0,0 +1,2 @@
|
||||
[local]
|
||||
localhost ansible_connection=local
|
||||
@ -0,0 +1,16 @@
|
||||
---
|
||||
- hosts: all
|
||||
become: true
|
||||
vars:
|
||||
database_name: "zksync_ext_node_mainnet"
|
||||
database_username: "postgres"
|
||||
database_password: "notsecurepassword"
|
||||
eth_l1_url: "https://ethereum-rpc.publicnode.com"
|
||||
main_node_url: "https://zksync2-mainnet.zksync.io"
|
||||
l1_chain_id: "1"
|
||||
l2_chain_id: "324"
|
||||
enable_snapshots_recovery: true
|
||||
snapshots_bucket_base_url: "zksync-era-mainnet-external-node-snapshots"
|
||||
|
||||
roles:
|
||||
- external_node
|
||||
@ -0,0 +1,15 @@
|
||||
---
|
||||
roles:
|
||||
- name: geerlingguy.docker
|
||||
src: https://github.com/geerlingguy/ansible-role-docker
|
||||
version: "7.1.0"
|
||||
- name: external_node
|
||||
src: https://github.com/matter-labs/ansible-en-role
|
||||
version: "v3.3.0"
|
||||
|
||||
collections:
|
||||
- name: community.general
|
||||
version: 8.4.0
|
||||
# Collection for the replication only.
|
||||
- name: community.postgresql
|
||||
version: 3.7.0
|
||||
@ -2,12 +2,12 @@
|
||||
dependencies:
|
||||
- src: geerlingguy.docker
|
||||
version: "7.1.0"
|
||||
when: docker_install
|
||||
when: docker_install_compose
|
||||
|
||||
galaxy_info:
|
||||
role_name: external_node
|
||||
author: matter-labs
|
||||
description: External node setup
|
||||
description: External Node setup
|
||||
license: "license (MIT, APACHE)"
|
||||
min_ansible_version: "2.13.9"
|
||||
platforms:
|
||||
|
||||
@ -49,6 +49,23 @@
|
||||
source: "{{ loadbalancer_ip | mandatory }}"
|
||||
jump: ACCEPT
|
||||
|
||||
- name: Allow consensus port traffic from any IP
|
||||
when: enable_consensus
|
||||
ansible.builtin.iptables:
|
||||
chain: INPUT
|
||||
protocol: tcp
|
||||
destination_port: "{{ consensus_port }}"
|
||||
jump: ACCEPT
|
||||
|
||||
- name: Allow postgres replication traffic from replica only
|
||||
when: enable_postgres_replication
|
||||
ansible.builtin.iptables:
|
||||
chain: INPUT
|
||||
protocol: tcp
|
||||
destination_port: 5432
|
||||
source: "{{ postgres_replica_address }}"
|
||||
jump: ACCEPT
|
||||
|
||||
- name: Set default policy to DROP
|
||||
ansible.builtin.iptables:
|
||||
chain: INPUT
|
||||
|
||||
@ -9,3 +9,7 @@
|
||||
|
||||
- name: Prepare configs
|
||||
ansible.builtin.include_tasks: provision.yml
|
||||
|
||||
- name: Configure replication on main instance
|
||||
ansible.builtin.include_tasks: replication.yml
|
||||
when: enable_postgres_replication
|
||||
|
||||
@ -32,13 +32,30 @@
|
||||
- l2_chain_id
|
||||
- l1_chain_id
|
||||
|
||||
- name: "Verify that required variables for replication is set"
|
||||
when: enable_postgres_replication
|
||||
ansible.builtin.assert:
|
||||
that:
|
||||
- postgress_replication_required_var != ""
|
||||
fail_msg: "{{ postgress_replication_required_var }} needs to be set for the role for postgres replication to work"
|
||||
success_msg: "Required variable for postgres replication {{ postgress_replication_required_var }} isn't empty"
|
||||
loop_control:
|
||||
loop_var: postgress_replication_required_var
|
||||
with_items:
|
||||
- enable_postgres_replication
|
||||
- postgres_replication_bind_address
|
||||
- postgres_replica_address
|
||||
- postgres_replications_arguments
|
||||
- postgres_replica_user_name
|
||||
- postgres_replica_user_password
|
||||
|
||||
- name: Check required en vars empty
|
||||
ansible.builtin.fail:
|
||||
msg: "Variable '{{ item }}' is empty"
|
||||
when: vars[item] == ""
|
||||
with_items: "{{ en_required_variables }}"
|
||||
|
||||
- name: Copy main configs
|
||||
- name: Create main configs
|
||||
ansible.builtin.template:
|
||||
src: '{{ item.src }}'
|
||||
dest: '{{ item.dest }}'
|
||||
@ -51,7 +68,7 @@
|
||||
- src: "templates/postgres.env.j2"
|
||||
dest: "{{ configuration_directory }}/postgres.env"
|
||||
|
||||
- name: Copy restore script
|
||||
- name: Create restore script
|
||||
register: restore_dump_script
|
||||
ansible.builtin.template:
|
||||
src: 'templates/restore_dump.sh.j2'
|
||||
@ -64,7 +81,7 @@
|
||||
when: enable_monitoring and ( vars[item] == "" )
|
||||
with_items: "{{ monitoring_required_variables }}"
|
||||
|
||||
- name: Copy monitoring configs
|
||||
- name: Create monitoring configs
|
||||
when: enable_monitoring
|
||||
ansible.builtin.template:
|
||||
src: '{{ item.src }}'
|
||||
@ -76,23 +93,38 @@
|
||||
- src: "templates/vmagent-config.yml.j2"
|
||||
dest: "{{ configuration_directory }}/vmagent-config.yml"
|
||||
|
||||
- name: Create consensus config
|
||||
when: enable_consensus
|
||||
ansible.builtin.template:
|
||||
src: "templates/consensus_config.yaml.j2"
|
||||
dest: "{{ configuration_directory }}/consensus_config.yaml"
|
||||
mode: '0644'
|
||||
|
||||
- name: Decrypt consensus_secrets
|
||||
when: enable_consensus
|
||||
ansible.builtin.copy:
|
||||
src: "{{ consensus_secrets_file }}"
|
||||
dest: "{{ configuration_directory }}/consensus_secrets.yaml"
|
||||
decrypt: true
|
||||
mode: '0600'
|
||||
|
||||
- name: Run docker-compose without monitoring
|
||||
when: not enable_monitoring
|
||||
ansible.builtin.shell:
|
||||
cmd: nohup docker compose -f docker-compose.yaml up -d &
|
||||
cmd: nohup docker compose -f docker-compose.yaml up -d </dev/null >/dev/null 2>&1 &
|
||||
chdir: "{{ configuration_directory }}"
|
||||
changed_when: false
|
||||
|
||||
- name: Run docker-compose with monitoring
|
||||
when: enable_monitoring and (not restore_dump_script.changed)
|
||||
ansible.builtin.shell:
|
||||
cmd: nohup docker compose -f monitoring.yaml -f docker-compose.yaml up -d &
|
||||
cmd: nohup docker compose -f monitoring.yaml -f docker-compose.yaml up -d </dev/null >/dev/null 2>&1 &
|
||||
chdir: "{{ configuration_directory }}"
|
||||
changed_when: false
|
||||
|
||||
- name: Run docker-compose with monitoring with recreation
|
||||
when: enable_monitoring and restore_dump_script.changed
|
||||
ansible.builtin.shell:
|
||||
cmd: nohup docker compose -f monitoring.yaml -f docker-compose.yaml up -d --force-recreate &
|
||||
cmd: nohup docker compose -f monitoring.yaml -f docker-compose.yaml up -d --force-recreate </dev/null >/dev/null 2>&1 &
|
||||
chdir: "{{ configuration_directory }}"
|
||||
changed_when: false
|
||||
|
||||
60
tasks/replication.yml
Normal file
60
tasks/replication.yml
Normal file
@ -0,0 +1,60 @@
|
||||
---
|
||||
|
||||
- name: Install libpq-dev packages
|
||||
ansible.builtin.apt:
|
||||
update_cache: true
|
||||
name: libpq-dev
|
||||
|
||||
- name: Install psycopg2 python package
|
||||
ansible.builtin.pip:
|
||||
name: psycopg2
|
||||
|
||||
- name: Grant user replication access for replication.
|
||||
community.postgresql.postgresql_pg_hba:
|
||||
dest: "{{ storage_directory }}/postgres/pg_hba.conf"
|
||||
contype: host
|
||||
users: "{{ postgres_replica_user_name }}"
|
||||
source: "{{ postgres_replica_address }}/32"
|
||||
databases: replication
|
||||
method: "{{ postgres_replica_auth_method }}"
|
||||
|
||||
- name: Create postgres replication user
|
||||
community.postgresql.postgresql_user:
|
||||
login_host: "{{ postgres_replication_bind_address }}"
|
||||
login_user: "{{ database_username }}"
|
||||
login_password: "{{ database_password }}"
|
||||
name: "{{ postgres_replica_user_name }}"
|
||||
password: "{{ postgres_replica_user_password }}"
|
||||
role_attr_flags: "REPLICATION"
|
||||
|
||||
- name: Create replication slot if doesn't exist
|
||||
community.postgresql.postgresql_slot:
|
||||
login_host: "{{ postgres_replication_bind_address }}"
|
||||
login_user: "{{ database_username }}"
|
||||
login_password: "{{ database_password }}"
|
||||
slot_name: replica
|
||||
|
||||
- name: Reload postgres configuration
|
||||
community.postgresql.postgresql_query:
|
||||
login_host: "{{ postgres_replication_bind_address }}"
|
||||
login_user: "{{ database_username }}"
|
||||
login_password: "{{ database_password }}"
|
||||
query: "SELECT pg_reload_conf()"
|
||||
|
||||
- name: Create postgres backup user
|
||||
community.postgresql.postgresql_user:
|
||||
login_host: "{{ postgres_replication_bind_address }}"
|
||||
login_user: "{{ database_username }}"
|
||||
login_password: "{{ database_password }}"
|
||||
name: "{{ backup_db_user }}"
|
||||
password: "{{ backup_db_password }}"
|
||||
|
||||
- name: Grant role pg_read_all_data to backup user
|
||||
community.postgresql.postgresql_membership:
|
||||
login_host: "{{ postgres_replication_bind_address }}"
|
||||
login_user: "{{ database_username }}"
|
||||
login_password: "{{ database_password }}"
|
||||
group: pg_read_all_data
|
||||
target_roles:
|
||||
- "{{ backup_db_user }}"
|
||||
state: present
|
||||
13
templates/consensus_config.yaml.j2
Normal file
13
templates/consensus_config.yaml.j2
Normal file
@ -0,0 +1,13 @@
|
||||
server_addr: '0.0.0.0:3054'
|
||||
public_addr: '{{ ansible_default_ipv4.address }}:{{ consensus_port }}'
|
||||
max_payload_size: 5000000
|
||||
gossip_dynamic_inbound_limit: 200
|
||||
{% if consensus_debug_port_enabled %}
|
||||
debug_page_addr: "0.0.0.0:{{ consensus_debug_port }}"
|
||||
{% endif %}
|
||||
rpc_config:
|
||||
get_block_rate:
|
||||
burst: 5
|
||||
refresh: # 0.2s
|
||||
seconds: 0
|
||||
nanos: 200000000
|
||||
@ -8,10 +8,13 @@ services:
|
||||
- "--log.level=INFO"
|
||||
- "--providers.docker=true"
|
||||
- "--providers.docker.exposedbydefault=false"
|
||||
- "--entrypoints.web.address=:80"
|
||||
- "--entrypoints.external_node_health.address=:3080"
|
||||
- "--entryPoints.web.address=:80"
|
||||
- "--entryPoints.external_node_health.address=:3080"
|
||||
{% if enable_consensus %}
|
||||
- "--entryPoints.external_node_consensus.address=:{{ consensus_port }}"
|
||||
{% endif %}
|
||||
{% if enable_tls %}
|
||||
- "--entrypoints.websecure.address=:443"
|
||||
- "--entryPoints.websecure.address=:443"
|
||||
- "--certificatesresolvers.en_resolver.acme.tlschallenge=true"
|
||||
- "--certificatesresolvers.en_resolver.acme.storage=/letsencrypt/acme.json"
|
||||
- "--certificatesresolvers.myresolver.acme.email={{ acme_email }}"
|
||||
@ -40,14 +43,27 @@ services:
|
||||
- ./restore_dump.sh:/docker-entrypoint-initdb.d/restore_dump.sh
|
||||
env_file:
|
||||
- postgres.env
|
||||
{% if enable_postgres_replication %}
|
||||
ports:
|
||||
- "{{ postgres_replication_bind_address }}:5432:5432"
|
||||
{% endif %}
|
||||
command:
|
||||
- postgres
|
||||
- -c
|
||||
{% for argument in postgres_arguments %}
|
||||
- {{ argument }}
|
||||
{% endfor %}
|
||||
{% if enable_postgres_replication %}
|
||||
{% for repl_argument in postgres_replications_arguments %}
|
||||
- {{ repl_argument }}
|
||||
{% endfor %}
|
||||
{% endif %}
|
||||
external_node:
|
||||
{% if not external_node_raw_docker_tag %}
|
||||
image: "matterlabs/external-node:v{{ external_node_version }}"
|
||||
{% else %}
|
||||
image: "matterlabs/external-node:{{ external_node_raw_docker_tag }}"
|
||||
{% endif %}
|
||||
restart: unless-stopped
|
||||
depends_on:
|
||||
postgres:
|
||||
@ -72,12 +88,21 @@ services:
|
||||
{% if enable_basic_auth %}
|
||||
- "traefik.http.routers.external_node_main.middlewares=external_node_auth"
|
||||
- "traefik.http.middlewares.external_node_auth.basicauth.users={{ basic_auth_secret }}"
|
||||
{% endif %}
|
||||
{% if enable_consensus %}
|
||||
- "traefik.tcp.services.external_node_consensus.loadbalancer.server.port={{ consensus_port }}"
|
||||
- "traefik.tcp.routers.external_node_consensus.rule=HostSNI(`*`)"
|
||||
- "traefik.tcp.routers.external_node_consensus.entrypoints=external_node_consensus"
|
||||
- "traefik.tcp.routers.external_node_consensus.service=external_node_consensus"
|
||||
{% endif %}
|
||||
expose:
|
||||
- {{ rpc_http_port }}
|
||||
- {{ rpc_ws_port }}
|
||||
- {{ healthcheck_port }}
|
||||
- {{ metrics_port }}
|
||||
{% if enable_consensus %}
|
||||
- {{ consensus_port }}
|
||||
{% endif %}
|
||||
environment:
|
||||
ZKSYNC_HOME: "/"
|
||||
EN_STATE_CACHE_PATH: /db/state_keeper
|
||||
@ -91,7 +116,11 @@ services:
|
||||
DATABASE_POOL_SIZE: 200
|
||||
EN_MAX_BLOCKS_PER_TREE_BATCH: 200
|
||||
MISC_LOG_FORMAT: json
|
||||
RUST_LOG: zksync_external_node={{ log_verbosity }}
|
||||
RUST_LOG: {{ rust_log }}
|
||||
{% if enable_consensus %}
|
||||
EN_CONSENSUS_CONFIG_PATH: /etc/consensus_config.yaml
|
||||
EN_CONSENSUS_SECRETS_PATH: /run/secrets/consensus_secrets
|
||||
{% endif %}
|
||||
healthcheck:
|
||||
test: [ "CMD", "curl", "-f", "http://localhost:{{ healthcheck_port }}/health" ]
|
||||
interval: 1m
|
||||
@ -100,6 +129,21 @@ services:
|
||||
start_period: 1m
|
||||
volumes:
|
||||
- "{{ storage_directory }}/db:/db"
|
||||
{% if enable_consensus %}
|
||||
- "{{ configuration_directory }}/consensus_config.yaml:/etc/consensus_config.yaml"
|
||||
{% endif %}
|
||||
env_file:
|
||||
- "external_node.env"
|
||||
- "postgres.env"
|
||||
command:
|
||||
{% if enable_consensus %}
|
||||
- --enable-consensus
|
||||
secrets:
|
||||
- consensus_secrets
|
||||
{% endif %}
|
||||
|
||||
{% if enable_consensus %}
|
||||
secrets:
|
||||
consensus_secrets:
|
||||
file: consensus_secrets.yaml
|
||||
{% endif %}
|
||||
|
||||
@ -2,4 +2,16 @@ EN_ETH_CLIENT_URL="{{ eth_l1_url | mandatory }}"
|
||||
EN_MAIN_NODE_URL="{{ main_node_url | mandatory }}"
|
||||
EN_L2_CHAIN_ID="{{ l2_chain_id | mandatory }}"
|
||||
EN_L1_CHAIN_ID="{{ l1_chain_id | mandatory }}"
|
||||
{% if enable_snapshots_recovery %}
|
||||
EN_SNAPSHOTS_RECOVERY_ENABLED="true"
|
||||
EN_SNAPSHOTS_OBJECT_STORE_MODE="GCSAnonymousReadOnly"
|
||||
EN_SNAPSHOTS_OBJECT_STORE_BUCKET_BASE_URL="{{ snapshots_bucket_base_url | mandatory }}"
|
||||
{% endif %}
|
||||
|
||||
DATABASE_URL="postgres://{{ database_username | mandatory }}:{{ database_password | mandatory }}@postgres/{{ database_name | mandatory }}"
|
||||
|
||||
{% if additional_env_vars is defined and additional_env_vars|length > 0 %}
|
||||
{% for env_var in additional_env_vars %}
|
||||
{{ env_var.name }}="{{ env_var.value }}"
|
||||
{% endfor %}
|
||||
{% endif %}
|
||||
|
||||
@ -3,7 +3,7 @@ set -e
|
||||
|
||||
{% if force_pg_restore %}
|
||||
pg_restore --clean --exit-on-error -j $(nproc --all) -d postgres -U $POSTGRES_USER --no-owner --no-privileges --disable-triggers --create /pg_backups/external_node_latest.pgdump
|
||||
{% else %}
|
||||
{% elif not enable_snapshots_recovery %}
|
||||
if psql -U $POSTGRES_USER -d postgres -lqt | cut -d \| -f 1 | grep -qw "{{ database_name }}"; then
|
||||
echo "Database already exists"
|
||||
else
|
||||
|
||||
@ -33,7 +33,8 @@ scrape_configs:
|
||||
- job_name: traefik
|
||||
static_configs:
|
||||
- targets:
|
||||
- "traefik:8080"
|
||||
# traefik uses network host, so docker DNS wouldn't work.
|
||||
- "127.0.0.1:8080"
|
||||
relabel_configs:
|
||||
- source_labels: [instance]
|
||||
target_label: instance
|
||||
|
||||
Reference in New Issue
Block a user