-
Notifications
You must be signed in to change notification settings - Fork 19
Adding Collators
Wil Wade edited this page Nov 10, 2022
·
21 revisions
We currently are only using "invulnerable" collators, however much of this will still apply when we switch to open collators sometime in 2023.
There are five keys that matter for a collator node:
-
The Networking Key
- Collator: Can be auto-generated
- Can be set via CLI with
--node-key
or--node-key-file
, usually for public bootnodes- Remember that
--node-key-file
reads the file bytes, so do not have trailing new lines or other whitespace.
- Remember that
- Used by
libp2p
for secure node communications and is the public key at the end of the node multiaddr
-
The Controller Account Key (Sometimes referred to as the
Account ID
)- Account used to control the collator
- When an invulnerable collator, should be set as one of the "invulnerable keys"
-
The Invulnerable Address Key
- The controller account's address
- Must be added to the invulnerables using
collatorSelection.setInvulnerables
-
The Stash Account Key (Sometimes referred to as the
Validator ID
)- Not used with collator selection
- Should be the same as the controller account
-
The Session Aura Key
- "Owned" by the the controller account
- Does the actual work of signing blocks
- Can be rotated by generating a new key on the node with
author_rotateKey
, then callingsession.setKeys
from the controller account
- Create a new full node and match or exceed the official collator requirements
- Remember that the node should be able to peer with others, but access to HTTP and WebSocket RPCs should be restricted
- Wait until the relay chain and parachain are up to date and synced
- Generate a new Controller Account aura key:
subkey generate
- If you want a password, you can add that
subkey generate --password [password here]
- If you want a password, you can add that
- Generate a new Session Key
- Node Generated
- Use
author_rotateKey
("unsafe" RPC required) - Returns the new public key
- Use
- Manually Generated via
subkey generate
- Add to the node with
author_insertKey
("unsafe" RPC required)
- Add to the node with
- Node Generated
- Register a session key
- Submit the Extrinsic:
session.setKeys
- Sender: The Controller Account
- keys: Address of the new Session Key
- proof:
0x
(Yes, it is empty)
- New session keys do not become active until the next session (every ~6h)
- It is also possible for your session key to match your Controller Account, but not suggested for production
- Submit the Extrinsic:
- Once the Collator is setup, take the Controller Account Address
- Set the new list of invulnerables:
- Sudo (Rococo, Mainnet for now)
sudo.sudo(call)
-
collatorSelection.setInvulnerables
- SUPER IMPORTANT: List all current invulnerables
- Add the new Controller Account Address to the end of the list
- Frequency Council (Mainnet)
- New Council motion
-
collatorSelection.setInvulnerables
- SUPER IMPORTANT: List all current invulnerables
- Add the new Controller Account Address to the end of the list
- Passes with at least 3/5ths of the vote
- Voting and passing
- Sudo (Rococo, Mainnet for now)
- Wait until the next session (sessions are ~6 hours long)
- Secure in a Wallet
- Controller Keys
- Listed in the invulnerables
- All controller addresses
- On a Collator
- Session key registered to the controller address
- https://wiki.polkadot.network/docs/maintain-guides-how-to-validate-polkadot#set-session-keys
- https://wiki.polkadot.network/docs/learn-keys
- Suggested: Subkey https://support.polkadot.network/support/solutions/articles/65000180519-how-to-create-an-account-in-subkey
- macOS Prereq
- rust https://rustup.rs/
- protobuf
brew install protobuf
- macOS Prereq
- Alternatives: https://wiki.polkadot.network/docs/learn-account-generation
Usually only used for changing servers or initial setup
Params:
- Key Type: "aura"
- Secret Phrase
- Hex Public Key
curl --location --request POST 'http://locahost:9933' \
--header 'Content-Type: application/json' \
--data-raw '{
"jsonrpc": "2.0",
"method": "author_insertKey",
"params": ["aura", "secret phrase would go here but this is not one", "0x4252d29a65087ceddb645ebac744628009b51c8e60fff750d99ba6ce1f1cf366"],
"id": 1
}'
Returns the new public key that would be used for rotating the session key on chain
curl --location --request POST 'http://locahost:9933' \
--header 'Content-Type: application/json' \
--data-raw '{
"jsonrpc": "2.0",
"method": "author_rotateKeys",
"params": [],
"id": 1
}'
Params:
- Hex Public Key
- Key Type: "aura"
curl --location --request POST 'http://locahost:9933' \
--header 'Content-Type: application/json' \
--data-raw '{
"jsonrpc": "2.0",
"method": "author_hasKey",
"params": ["0x4252d29a65087ceddb645ebac744628009b51c8e60fff750d99ba6ce1f1cf366", "aura"],
"id": 1
}'
-
-lcumulus-collator=trace
Trouble with collating and forming blocks -
-lsync=trace
Trouble with syncing and peers