nixpkgs/nixos/modules/services/blockchain/ethereum/lighthouse.nix

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

333 lines
11 KiB
Nix
Raw Normal View History

2024-10-31 05:57:25 +00:00
{
config,
lib,
pkgs,
...
}:
2022-11-07 12:36:28 +00:00
let
cfg = config.services.lighthouse;
2024-10-31 05:57:25 +00:00
in
{
2022-11-07 12:36:28 +00:00
options = {
services.lighthouse = {
beacon = lib.mkOption {
2022-11-07 12:36:28 +00:00
description = "Beacon node";
2024-10-31 05:57:25 +00:00
default = { };
type = lib.types.submodule {
2022-11-07 12:36:28 +00:00
options = {
enable = lib.mkEnableOption "Lightouse Beacon node";
dataDir = lib.mkOption {
type = lib.types.str;
2022-11-07 12:36:28 +00:00
default = "/var/lib/lighthouse-beacon";
description = ''
Directory where data will be stored. Each chain will be stored under it's own specific subdirectory.
'';
};
address = lib.mkOption {
type = lib.types.str;
2022-11-07 12:36:28 +00:00
default = "0.0.0.0";
description = ''
Listen address of Beacon node.
'';
};
port = lib.mkOption {
type = lib.types.port;
2022-11-07 12:36:28 +00:00
default = 9000;
description = ''
Port number the Beacon node will be listening on.
'';
};
openFirewall = lib.mkOption {
type = lib.types.bool;
2022-11-07 12:36:28 +00:00
default = false;
description = ''
Open the port in the firewall
'';
};
disableDepositContractSync = lib.mkOption {
type = lib.types.bool;
2022-11-07 12:36:28 +00:00
default = false;
description = ''
2022-12-18 00:31:14 +00:00
Explicitly disables syncing of deposit logs from the execution node.
2022-11-07 12:36:28 +00:00
This overrides any previous option that depends on it.
Useful if you intend to run a non-validating beacon node.
'';
};
execution = {
address = lib.mkOption {
type = lib.types.str;
2022-11-07 12:36:28 +00:00
default = "127.0.0.1";
description = ''
Listen address for the execution layer.
'';
};
port = lib.mkOption {
type = lib.types.port;
2022-11-07 12:36:28 +00:00
default = 8551;
description = ''
Port number the Beacon node will be listening on for the execution layer.
'';
};
jwtPath = lib.mkOption {
type = lib.types.str;
2022-11-07 12:36:28 +00:00
default = "";
description = ''
Path for the jwt secret required to connect to the execution layer.
'';
};
};
http = {
enable = lib.mkEnableOption "Beacon node http api";
port = lib.mkOption {
type = lib.types.port;
2022-11-07 12:36:28 +00:00
default = 5052;
description = ''
Port number of Beacon node RPC service.
'';
};
address = lib.mkOption {
type = lib.types.str;
2022-11-07 12:36:28 +00:00
default = "127.0.0.1";
description = ''
Listen address of Beacon node RPC service.
'';
};
};
metrics = {
enable = lib.mkEnableOption "Beacon node prometheus metrics";
address = lib.mkOption {
type = lib.types.str;
2022-11-07 12:36:28 +00:00
default = "127.0.0.1";
description = ''
Listen address of Beacon node metrics service.
'';
};
port = lib.mkOption {
type = lib.types.port;
2022-11-07 12:36:28 +00:00
default = 5054;
description = ''
Port number of Beacon node metrics service.
'';
};
};
extraArgs = lib.mkOption {
type = lib.types.str;
2022-11-07 12:36:28 +00:00
description = ''
Additional arguments passed to the lighthouse beacon command.
'';
default = "";
example = "";
};
};
};
};
validator = lib.mkOption {
2022-11-07 12:36:28 +00:00
description = "Validator node";
2024-10-31 05:57:25 +00:00
default = { };
type = lib.types.submodule {
2022-11-07 12:36:28 +00:00
options = {
enable = lib.mkOption {
type = lib.types.bool;
2022-11-07 12:36:28 +00:00
default = false;
description = "Enable Lightouse Validator node.";
};
dataDir = lib.mkOption {
type = lib.types.str;
2022-11-07 12:36:28 +00:00
default = "/var/lib/lighthouse-validator";
description = ''
Directory where data will be stored. Each chain will be stored under it's own specific subdirectory.
'';
};
beaconNodes = lib.mkOption {
type = lib.types.listOf lib.types.str;
2024-10-31 05:57:25 +00:00
default = [ "http://localhost:5052" ];
2022-11-07 12:36:28 +00:00
description = ''
Beacon nodes to connect to.
'';
};
metrics = {
enable = lib.mkEnableOption "Validator node prometheus metrics";
address = lib.mkOption {
type = lib.types.str;
2022-11-07 12:36:28 +00:00
default = "127.0.0.1";
description = ''
Listen address of Validator node metrics service.
'';
};
port = lib.mkOption {
type = lib.types.port;
2022-11-07 12:36:28 +00:00
default = 5056;
description = ''
Port number of Validator node metrics service.
'';
};
};
extraArgs = lib.mkOption {
type = lib.types.str;
2022-11-07 12:36:28 +00:00
description = ''
Additional arguments passed to the lighthouse validator command.
'';
default = "";
example = "";
};
};
};
};
network = lib.mkOption {
2024-10-31 05:57:25 +00:00
type = lib.types.enum [
"mainnet"
"gnosis"
"chiado"
"sepolia"
"holesky"
];
2022-11-07 12:36:28 +00:00
default = "mainnet";
description = ''
The network to connect to. Mainnet is the default ethereum network.
'';
};
extraArgs = lib.mkOption {
type = lib.types.str;
2022-11-07 12:36:28 +00:00
description = ''
Additional arguments passed to every lighthouse command.
'';
default = "";
example = "";
};
2024-10-31 05:57:51 +00:00
package = lib.mkPackageOption pkgs "lighthouse" { };
2022-11-07 12:36:28 +00:00
};
};
config = lib.mkIf (cfg.beacon.enable || cfg.validator.enable) {
2024-10-31 05:57:25 +00:00
environment.systemPackages = [ cfg.package ];
2022-11-07 12:36:28 +00:00
networking.firewall = lib.mkIf cfg.beacon.enable {
allowedTCPPorts = lib.mkIf cfg.beacon.openFirewall [ cfg.beacon.port ];
allowedUDPPorts = lib.mkIf cfg.beacon.openFirewall [ cfg.beacon.port ];
2022-11-07 12:36:28 +00:00
};
systemd.services.lighthouse-beacon = lib.mkIf cfg.beacon.enable {
2022-11-07 12:36:28 +00:00
description = "Lighthouse beacon node (connect to P2P nodes and verify blocks)";
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
script = ''
# make sure the chain data directory is created on first run
mkdir -p ${cfg.beacon.dataDir}/${cfg.network}
2024-10-31 05:58:10 +00:00
${lib.getExe cfg.package} beacon_node \
2022-11-07 12:36:28 +00:00
--disable-upnp \
${lib.optionalString cfg.beacon.disableDepositContractSync "--disable-deposit-contract-sync"} \
--port ${toString cfg.beacon.port} \
--listen-address ${cfg.beacon.address} \
--network ${cfg.network} \
--datadir ${cfg.beacon.dataDir}/${cfg.network} \
--execution-endpoint http://${cfg.beacon.execution.address}:${toString cfg.beacon.execution.port} \
--execution-jwt ''${CREDENTIALS_DIRECTORY}/LIGHTHOUSE_JWT \
2024-10-31 05:57:25 +00:00
${lib.optionalString cfg.beacon.http.enable ''--http --http-address ${cfg.beacon.http.address} --http-port ${toString cfg.beacon.http.port}''} \
${lib.optionalString cfg.beacon.metrics.enable ''--metrics --metrics-address ${cfg.beacon.metrics.address} --metrics-port ${toString cfg.beacon.metrics.port}''} \
2022-11-07 12:36:28 +00:00
${cfg.extraArgs} ${cfg.beacon.extraArgs}
'';
serviceConfig = {
LoadCredential = "LIGHTHOUSE_JWT:${cfg.beacon.execution.jwtPath}";
DynamicUser = true;
2022-11-07 12:36:28 +00:00
Restart = "on-failure";
StateDirectory = "lighthouse-beacon";
ReadWritePaths = [ cfg.beacon.dataDir ];
2022-11-07 12:36:28 +00:00
NoNewPrivileges = true;
PrivateTmp = true;
ProtectHome = true;
ProtectClock = true;
ProtectProc = "noaccess";
ProcSubset = "pid";
ProtectKernelLogs = true;
ProtectKernelModules = true;
ProtectKernelTunables = true;
ProtectControlGroups = true;
ProtectHostname = true;
RestrictSUIDSGID = true;
RestrictRealtime = true;
RestrictNamespaces = true;
LockPersonality = true;
RemoveIPC = true;
2024-10-31 05:57:25 +00:00
SystemCallFilter = [
"@system-service"
"~@privileged"
];
2022-11-07 12:36:28 +00:00
};
};
systemd.services.lighthouse-validator = lib.mkIf cfg.validator.enable {
2022-11-07 12:36:28 +00:00
description = "Lighthouse validtor node (manages validators, using data obtained from the beacon node via a HTTP API)";
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
script = ''
# make sure the chain data directory is created on first run
mkdir -p ${cfg.validator.dataDir}/${cfg.network}
${lib.getExe cfg.package} validator_client \
2022-11-07 12:36:28 +00:00
--network ${cfg.network} \
--beacon-nodes ${lib.concatStringsSep "," cfg.validator.beaconNodes} \
--datadir ${cfg.validator.dataDir}/${cfg.network} \
${lib.optionalString cfg.validator.metrics.enable ''--metrics --metrics-address ${cfg.validator.metrics.address} --metrics-port ${toString cfg.validator.metrics.port}''} \
2022-11-07 12:36:28 +00:00
${cfg.extraArgs} ${cfg.validator.extraArgs}
'';
serviceConfig = {
Restart = "on-failure";
StateDirectory = "lighthouse-validator";
ReadWritePaths = [ cfg.validator.dataDir ];
2022-11-07 12:36:28 +00:00
CapabilityBoundingSet = "";
DynamicUser = true;
NoNewPrivileges = true;
PrivateTmp = true;
ProtectHome = true;
ProtectClock = true;
ProtectProc = "noaccess";
ProcSubset = "pid";
ProtectKernelLogs = true;
ProtectKernelModules = true;
ProtectKernelTunables = true;
ProtectControlGroups = true;
ProtectHostname = true;
RestrictSUIDSGID = true;
RestrictRealtime = true;
RestrictNamespaces = true;
LockPersonality = true;
RemoveIPC = true;
2024-10-31 05:57:25 +00:00
RestrictAddressFamilies = [
"AF_INET"
"AF_INET6"
];
SystemCallFilter = [
"@system-service"
"~@privileged"
];
2022-11-07 12:36:28 +00:00
};
};
};
}