2015-07-07 03:54:22 +03:00
|
|
|
// Copyright 2015 The go-ethereum Authors
|
|
|
|
// This file is part of go-ethereum.
|
|
|
|
//
|
|
|
|
// go-ethereum is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// go-ethereum is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
2015-07-22 19:48:40 +03:00
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
2015-07-07 03:54:22 +03:00
|
|
|
// GNU General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU General Public License
|
2015-07-22 19:48:40 +03:00
|
|
|
// along with go-ethereum. If not, see <http://www.gnu.org/licenses/>.
|
2015-07-07 03:54:22 +03:00
|
|
|
|
2016-11-25 18:55:06 +03:00
|
|
|
// Package utils contains internal helper functions for go-ethereum commands.
|
2015-03-06 04:00:41 +02:00
|
|
|
package utils
|
|
|
|
|
|
|
|
import (
|
2022-10-28 15:48:08 +03:00
|
|
|
"bytes"
|
2022-09-30 14:50:25 +03:00
|
|
|
"context"
|
2015-03-06 04:00:41 +02:00
|
|
|
"crypto/ecdsa"
|
2023-01-24 13:11:33 +03:00
|
|
|
"encoding/hex"
|
2022-09-30 14:50:25 +03:00
|
|
|
"errors"
|
2015-04-20 18:45:37 +03:00
|
|
|
"fmt"
|
2021-04-06 17:23:35 +03:00
|
|
|
"math"
|
2015-05-09 13:00:51 +03:00
|
|
|
"math/big"
|
2023-07-02 14:21:16 +03:00
|
|
|
"net"
|
2022-09-30 14:50:25 +03:00
|
|
|
"net/http"
|
2015-03-10 00:00:27 +02:00
|
|
|
"os"
|
2015-05-12 15:24:11 +03:00
|
|
|
"path/filepath"
|
2021-04-06 17:23:35 +03:00
|
|
|
godebug "runtime/debug"
|
2015-07-07 11:32:05 +03:00
|
|
|
"strconv"
|
2015-11-17 18:33:25 +02:00
|
|
|
"strings"
|
2018-07-02 15:51:02 +03:00
|
|
|
"time"
|
2015-05-12 15:24:11 +03:00
|
|
|
|
2015-03-07 13:39:52 +02:00
|
|
|
"github.com/ethereum/go-ethereum/accounts"
|
2017-01-24 12:49:20 +03:00
|
|
|
"github.com/ethereum/go-ethereum/accounts/keystore"
|
2015-03-18 09:44:58 +02:00
|
|
|
"github.com/ethereum/go-ethereum/common"
|
2018-01-11 23:55:21 +03:00
|
|
|
"github.com/ethereum/go-ethereum/common/fdlimit"
|
2022-10-28 15:48:08 +03:00
|
|
|
"github.com/ethereum/go-ethereum/common/hexutil"
|
2015-03-06 04:00:41 +02:00
|
|
|
"github.com/ethereum/go-ethereum/core"
|
2020-07-21 15:53:47 +03:00
|
|
|
"github.com/ethereum/go-ethereum/core/rawdb"
|
2023-06-16 15:29:40 +03:00
|
|
|
"github.com/ethereum/go-ethereum/core/txpool/legacypool"
|
2022-10-28 15:48:08 +03:00
|
|
|
"github.com/ethereum/go-ethereum/core/types"
|
2017-01-17 14:19:50 +03:00
|
|
|
"github.com/ethereum/go-ethereum/core/vm"
|
2015-03-06 04:00:41 +02:00
|
|
|
"github.com/ethereum/go-ethereum/crypto"
|
2023-05-10 14:54:14 +03:00
|
|
|
"github.com/ethereum/go-ethereum/crypto/kzg4844"
|
2015-03-06 04:00:41 +02:00
|
|
|
"github.com/ethereum/go-ethereum/eth"
|
all: activate pbss as experimental feature (#26274)
* all: activate pbss
* core/rawdb: fix compilation error
* cma, core, eth, les, trie: address comments
* cmd, core, eth, trie: polish code
* core, cmd, eth: address comments
* cmd, core, eth, les, light, tests: address comment
* cmd/utils: shorten log message
* trie/triedb/pathdb: limit node buffer size to 1gb
* cmd/utils: fix opening non-existing db
* cmd/utils: rename flag name
* cmd, core: group chain history flags and fix tests
* core, eth, trie: fix memory leak in snapshot generation
* cmd, eth, internal: deprecate flags
* all: enable state tests for pathdb, fixes
* cmd, core: polish code
* trie/triedb/pathdb: limit the node buffer size to 256mb
---------
Co-authored-by: Martin Holst Swende <martin@swende.se>
Co-authored-by: Péter Szilágyi <peterke@gmail.com>
2023-08-10 22:21:36 +03:00
|
|
|
"github.com/ethereum/go-ethereum/eth/catalyst"
|
2017-04-12 17:27:23 +03:00
|
|
|
"github.com/ethereum/go-ethereum/eth/downloader"
|
2021-02-05 15:51:15 +03:00
|
|
|
"github.com/ethereum/go-ethereum/eth/ethconfig"
|
2022-08-19 12:14:59 +03:00
|
|
|
"github.com/ethereum/go-ethereum/eth/filters"
|
2017-04-12 17:27:23 +03:00
|
|
|
"github.com/ethereum/go-ethereum/eth/gasprice"
|
2021-01-25 16:36:39 +03:00
|
|
|
"github.com/ethereum/go-ethereum/eth/tracers"
|
2015-03-06 04:00:41 +02:00
|
|
|
"github.com/ethereum/go-ethereum/ethdb"
|
2022-05-18 17:27:17 +03:00
|
|
|
"github.com/ethereum/go-ethereum/ethdb/remotedb"
|
2016-11-25 18:55:06 +03:00
|
|
|
"github.com/ethereum/go-ethereum/ethstats"
|
2019-06-12 11:24:24 +03:00
|
|
|
"github.com/ethereum/go-ethereum/graphql"
|
2020-08-03 20:40:46 +03:00
|
|
|
"github.com/ethereum/go-ethereum/internal/ethapi"
|
2020-07-14 11:35:32 +03:00
|
|
|
"github.com/ethereum/go-ethereum/internal/flags"
|
2016-01-13 20:35:48 +02:00
|
|
|
"github.com/ethereum/go-ethereum/les"
|
2017-02-22 15:10:07 +03:00
|
|
|
"github.com/ethereum/go-ethereum/log"
|
2015-08-07 10:56:49 +03:00
|
|
|
"github.com/ethereum/go-ethereum/metrics"
|
2020-07-03 20:12:22 +03:00
|
|
|
"github.com/ethereum/go-ethereum/metrics/exp"
|
2018-07-02 15:51:02 +03:00
|
|
|
"github.com/ethereum/go-ethereum/metrics/influxdb"
|
2019-04-23 10:08:51 +03:00
|
|
|
"github.com/ethereum/go-ethereum/miner"
|
2015-11-17 18:33:25 +02:00
|
|
|
"github.com/ethereum/go-ethereum/node"
|
2017-04-12 17:27:23 +03:00
|
|
|
"github.com/ethereum/go-ethereum/p2p"
|
all: new p2p node representation (#17643)
Package p2p/enode provides a generalized representation of p2p nodes
which can contain arbitrary information in key/value pairs. It is also
the new home for the node database. The "v4" identity scheme is also
moved here from p2p/enr to remove the dependency on Ethereum crypto from
that package.
Record signature handling is changed significantly. The identity scheme
registry is removed and acceptable schemes must be passed to any method
that needs identity. This means records must now be validated explicitly
after decoding.
The enode API is designed to make signature handling easy and safe: most
APIs around the codebase work with enode.Node, which is a wrapper around
a valid record. Going from enr.Record to enode.Node requires a valid
signature.
* p2p/discover: port to p2p/enode
This ports the discovery code to the new node representation in
p2p/enode. The wire protocol is unchanged, this can be considered a
refactoring change. The Kademlia table can now deal with nodes using an
arbitrary identity scheme. This requires a few incompatible API changes:
- Table.Lookup is not available anymore. It used to take a public key
as argument because v4 protocol requires one. Its replacement is
LookupRandom.
- Table.Resolve takes *enode.Node instead of NodeID. This is also for
v4 protocol compatibility because nodes cannot be looked up by ID
alone.
- Types Node and NodeID are gone. Further commits in the series will be
fixes all over the the codebase to deal with those removals.
* p2p: port to p2p/enode and discovery changes
This adapts package p2p to the changes in p2p/discover. All uses of
discover.Node and discover.NodeID are replaced by their equivalents from
p2p/enode.
New API is added to retrieve the enode.Node instance of a peer. The
behavior of Server.Self with discovery disabled is improved. It now
tries much harder to report a working IP address, falling back to
127.0.0.1 if no suitable address can be determined through other means.
These changes were needed for tests of other packages later in the
series.
* p2p/simulations, p2p/testing: port to p2p/enode
No surprises here, mostly replacements of discover.Node, discover.NodeID
with their new equivalents. The 'interesting' API changes are:
- testing.ProtocolSession tracks complete nodes, not just their IDs.
- adapters.NodeConfig has a new method to create a complete node.
These changes were needed to make swarm tests work.
Note that the NodeID change makes the code incompatible with old
simulation snapshots.
* whisper/whisperv5, whisper/whisperv6: port to p2p/enode
This port was easy because whisper uses []byte for node IDs and
URL strings in the API.
* eth: port to p2p/enode
Again, easy to port because eth uses strings for node IDs and doesn't
care about node information in any way.
* les: port to p2p/enode
Apart from replacing discover.NodeID with enode.ID, most changes are in
the server pool code. It now deals with complete nodes instead
of (Pubkey, IP, Port) triples. The database format is unchanged for now,
but we should probably change it to use the node database later.
* node: port to p2p/enode
This change simply replaces discover.Node and discover.NodeID with their
new equivalents.
* swarm/network: port to p2p/enode
Swarm has its own node address representation, BzzAddr, containing both
an overlay address (the hash of a secp256k1 public key) and an underlay
address (enode:// URL).
There are no changes to the BzzAddr format in this commit, but certain
operations such as creating a BzzAddr from a node ID are now impossible
because node IDs aren't public keys anymore.
Most swarm-related changes in the series remove uses of
NewAddrFromNodeID, replacing it with NewAddr which takes a complete node
as argument. ToOverlayAddr is removed because we can just use the node
ID directly.
2018-09-25 01:59:00 +03:00
|
|
|
"github.com/ethereum/go-ethereum/p2p/enode"
|
2015-03-06 04:00:41 +02:00
|
|
|
"github.com/ethereum/go-ethereum/p2p/nat"
|
2016-11-22 22:52:31 +03:00
|
|
|
"github.com/ethereum/go-ethereum/p2p/netutil"
|
2015-10-07 18:21:13 +03:00
|
|
|
"github.com/ethereum/go-ethereum/params"
|
2022-10-28 15:48:08 +03:00
|
|
|
"github.com/ethereum/go-ethereum/rlp"
|
2022-08-19 12:14:59 +03:00
|
|
|
"github.com/ethereum/go-ethereum/rpc"
|
all: activate pbss as experimental feature (#26274)
* all: activate pbss
* core/rawdb: fix compilation error
* cma, core, eth, les, trie: address comments
* cmd, core, eth, trie: polish code
* core, cmd, eth: address comments
* cmd, core, eth, les, light, tests: address comment
* cmd/utils: shorten log message
* trie/triedb/pathdb: limit node buffer size to 1gb
* cmd/utils: fix opening non-existing db
* cmd/utils: rename flag name
* cmd, core: group chain history flags and fix tests
* core, eth, trie: fix memory leak in snapshot generation
* cmd, eth, internal: deprecate flags
* all: enable state tests for pathdb, fixes
* cmd, core: polish code
* trie/triedb/pathdb: limit the node buffer size to 256mb
---------
Co-authored-by: Martin Holst Swende <martin@swende.se>
Co-authored-by: Péter Szilágyi <peterke@gmail.com>
2023-08-10 22:21:36 +03:00
|
|
|
"github.com/ethereum/go-ethereum/trie"
|
|
|
|
"github.com/ethereum/go-ethereum/trie/triedb/hashdb"
|
|
|
|
"github.com/ethereum/go-ethereum/trie/triedb/pathdb"
|
2019-05-31 12:30:28 +03:00
|
|
|
pcsclite "github.com/gballet/go-libpcsclite"
|
2021-04-06 17:23:35 +03:00
|
|
|
gopsutil "github.com/shirou/gopsutil/mem"
|
2022-06-27 19:22:36 +03:00
|
|
|
"github.com/urfave/cli/v2"
|
2015-03-06 04:00:41 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
// These are all the command line flags we support.
|
|
|
|
// If you add to this list, please remember to include the
|
|
|
|
// flag in the appropriate command definition.
|
|
|
|
//
|
|
|
|
// The flags are defined here so their names and help texts
|
|
|
|
// are the same for all commands.
|
|
|
|
|
|
|
|
var (
|
|
|
|
// General settings
|
2022-06-27 19:22:36 +03:00
|
|
|
DataDirFlag = &flags.DirectoryFlag{
|
|
|
|
Name: "datadir",
|
|
|
|
Usage: "Data directory for the databases and keystore",
|
|
|
|
Value: flags.DirectoryString(node.DefaultDataDir()),
|
|
|
|
Category: flags.EthCategory,
|
|
|
|
}
|
|
|
|
RemoteDBFlag = &cli.StringFlag{
|
|
|
|
Name: "remotedb",
|
|
|
|
Usage: "URL for remote database",
|
|
|
|
Category: flags.LoggingCategory,
|
|
|
|
}
|
2023-02-09 11:48:34 +03:00
|
|
|
DBEngineFlag = &cli.StringFlag{
|
|
|
|
Name: "db.engine",
|
2023-04-21 19:24:18 +03:00
|
|
|
Usage: "Backing database implementation to use ('pebble' or 'leveldb')",
|
|
|
|
Value: node.DefaultConfig.DBEngine,
|
2023-02-09 11:48:34 +03:00
|
|
|
Category: flags.EthCategory,
|
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
AncientFlag = &flags.DirectoryFlag{
|
|
|
|
Name: "datadir.ancient",
|
2022-08-08 12:08:36 +03:00
|
|
|
Usage: "Root directory for ancient data (default = inside chaindata)",
|
2022-06-27 19:22:36 +03:00
|
|
|
Category: flags.EthCategory,
|
|
|
|
}
|
|
|
|
MinFreeDiskSpaceFlag = &flags.DirectoryFlag{
|
|
|
|
Name: "datadir.minfreedisk",
|
|
|
|
Usage: "Minimum free disk space in MB, once reached triggers auto shut down (default = --cache.gc converted to MB, 0 = disabled)",
|
|
|
|
Category: flags.EthCategory,
|
|
|
|
}
|
|
|
|
KeyStoreDirFlag = &flags.DirectoryFlag{
|
|
|
|
Name: "keystore",
|
|
|
|
Usage: "Directory for the keystore (default = inside the datadir)",
|
|
|
|
Category: flags.AccountCategory,
|
|
|
|
}
|
|
|
|
USBFlag = &cli.BoolFlag{
|
|
|
|
Name: "usb",
|
|
|
|
Usage: "Enable monitoring and management of USB hardware wallets",
|
|
|
|
Category: flags.AccountCategory,
|
|
|
|
}
|
|
|
|
SmartCardDaemonPathFlag = &cli.StringFlag{
|
|
|
|
Name: "pcscdpath",
|
|
|
|
Usage: "Path to the smartcard daemon (pcscd) socket file",
|
|
|
|
Value: pcsclite.PCSCDSockName,
|
|
|
|
Category: flags.AccountCategory,
|
|
|
|
}
|
|
|
|
NetworkIdFlag = &cli.Uint64Flag{
|
|
|
|
Name: "networkid",
|
2023-06-02 14:03:21 +03:00
|
|
|
Usage: "Explicitly set network id (integer)(For testnets: use --goerli, --sepolia instead)",
|
2022-06-27 19:22:36 +03:00
|
|
|
Value: ethconfig.Defaults.NetworkId,
|
|
|
|
Category: flags.EthCategory,
|
|
|
|
}
|
|
|
|
MainnetFlag = &cli.BoolFlag{
|
|
|
|
Name: "mainnet",
|
|
|
|
Usage: "Ethereum mainnet",
|
|
|
|
Category: flags.EthCategory,
|
|
|
|
}
|
|
|
|
GoerliFlag = &cli.BoolFlag{
|
|
|
|
Name: "goerli",
|
|
|
|
Usage: "Görli network: pre-configured proof-of-authority test network",
|
|
|
|
Category: flags.EthCategory,
|
|
|
|
}
|
|
|
|
SepoliaFlag = &cli.BoolFlag{
|
|
|
|
Name: "sepolia",
|
|
|
|
Usage: "Sepolia network: pre-configured proof-of-work test network",
|
|
|
|
Category: flags.EthCategory,
|
|
|
|
}
|
|
|
|
|
|
|
|
// Dev mode
|
|
|
|
DeveloperFlag = &cli.BoolFlag{
|
|
|
|
Name: "dev",
|
|
|
|
Usage: "Ephemeral proof-of-authority network with a pre-funded developer account, mining enabled",
|
|
|
|
Category: flags.DevCategory,
|
|
|
|
}
|
2023-07-06 11:42:34 +03:00
|
|
|
DeveloperPeriodFlag = &cli.Uint64Flag{
|
2022-06-27 19:22:36 +03:00
|
|
|
Name: "dev.period",
|
|
|
|
Usage: "Block period to use in developer mode (0 = mine only if transaction pending)",
|
|
|
|
Category: flags.DevCategory,
|
|
|
|
}
|
|
|
|
DeveloperGasLimitFlag = &cli.Uint64Flag{
|
|
|
|
Name: "dev.gaslimit",
|
|
|
|
Usage: "Initial block gas limit",
|
|
|
|
Value: 11500000,
|
|
|
|
Category: flags.DevCategory,
|
|
|
|
}
|
|
|
|
|
|
|
|
IdentityFlag = &cli.StringFlag{
|
|
|
|
Name: "identity",
|
|
|
|
Usage: "Custom node name",
|
|
|
|
Category: flags.NetworkingCategory,
|
|
|
|
}
|
|
|
|
DocRootFlag = &flags.DirectoryFlag{
|
|
|
|
Name: "docroot",
|
|
|
|
Usage: "Document Root for HTTPClient file scheme",
|
|
|
|
Value: flags.DirectoryString(flags.HomeDir()),
|
|
|
|
Category: flags.APICategory,
|
|
|
|
}
|
|
|
|
ExitWhenSyncedFlag = &cli.BoolFlag{
|
|
|
|
Name: "exitwhensynced",
|
|
|
|
Usage: "Exits after block synchronisation completes",
|
|
|
|
Category: flags.EthCategory,
|
|
|
|
}
|
|
|
|
|
|
|
|
// Dump command options.
|
|
|
|
IterativeOutputFlag = &cli.BoolFlag{
|
2019-06-24 17:16:44 +03:00
|
|
|
Name: "iterative",
|
|
|
|
Usage: "Print streaming JSON iteratively, delimited by newlines",
|
2022-06-27 19:22:36 +03:00
|
|
|
Value: true,
|
2019-06-24 17:16:44 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
ExcludeStorageFlag = &cli.BoolFlag{
|
2019-06-24 17:16:44 +03:00
|
|
|
Name: "nostorage",
|
|
|
|
Usage: "Exclude storage entries (save db lookups)",
|
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
IncludeIncompletesFlag = &cli.BoolFlag{
|
2019-06-24 17:16:44 +03:00
|
|
|
Name: "incompletes",
|
|
|
|
Usage: "Include accounts for which we don't have the address (missing preimage)",
|
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
ExcludeCodeFlag = &cli.BoolFlag{
|
2019-06-24 17:16:44 +03:00
|
|
|
Name: "nocode",
|
|
|
|
Usage: "Exclude contract code (save db lookups)",
|
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
StartKeyFlag = &cli.StringFlag{
|
cmd/geth, eth, core: snapshot dump + unify with trie dump (#22795)
* cmd/geth, eth, core: snapshot dump + unify with trie dump
* cmd/evm: dump API fixes
* cmd/geth, core, eth: fix some remaining errors
* cmd/evm: dump - add limit, support address startkey, address review concerns
* cmd, core/state, eth: minor polishes, fix snap dump crash, unify format
Co-authored-by: Péter Szilágyi <peterke@gmail.com>
2021-05-12 11:05:39 +03:00
|
|
|
Name: "start",
|
|
|
|
Usage: "Start position. Either a hash or address",
|
|
|
|
Value: "0x0000000000000000000000000000000000000000000000000000000000000000",
|
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
DumpLimitFlag = &cli.Uint64Flag{
|
cmd/geth, eth, core: snapshot dump + unify with trie dump (#22795)
* cmd/geth, eth, core: snapshot dump + unify with trie dump
* cmd/evm: dump API fixes
* cmd/geth, core, eth: fix some remaining errors
* cmd/evm: dump - add limit, support address startkey, address review concerns
* cmd, core/state, eth: minor polishes, fix snap dump crash, unify format
Co-authored-by: Péter Szilágyi <peterke@gmail.com>
2021-05-12 11:05:39 +03:00
|
|
|
Name: "limit",
|
|
|
|
Usage: "Max number of elements (0 = no limit)",
|
|
|
|
Value: 0,
|
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
|
2021-02-05 15:51:15 +03:00
|
|
|
defaultSyncMode = ethconfig.Defaults.SyncMode
|
all: activate pbss as experimental feature (#26274)
* all: activate pbss
* core/rawdb: fix compilation error
* cma, core, eth, les, trie: address comments
* cmd, core, eth, trie: polish code
* core, cmd, eth: address comments
* cmd, core, eth, les, light, tests: address comment
* cmd/utils: shorten log message
* trie/triedb/pathdb: limit node buffer size to 1gb
* cmd/utils: fix opening non-existing db
* cmd/utils: rename flag name
* cmd, core: group chain history flags and fix tests
* core, eth, trie: fix memory leak in snapshot generation
* cmd, eth, internal: deprecate flags
* all: enable state tests for pathdb, fixes
* cmd, core: polish code
* trie/triedb/pathdb: limit the node buffer size to 256mb
---------
Co-authored-by: Martin Holst Swende <martin@swende.se>
Co-authored-by: Péter Szilágyi <peterke@gmail.com>
2023-08-10 22:21:36 +03:00
|
|
|
SnapshotFlag = &cli.BoolFlag{
|
2022-06-27 19:22:36 +03:00
|
|
|
Name: "snapshot",
|
|
|
|
Usage: `Enables snapshot-database mode (default = enable)`,
|
|
|
|
Value: true,
|
|
|
|
Category: flags.EthCategory,
|
|
|
|
}
|
|
|
|
LightKDFFlag = &cli.BoolFlag{
|
|
|
|
Name: "lightkdf",
|
|
|
|
Usage: "Reduce key-derivation RAM & CPU usage at some expense of KDF strength",
|
|
|
|
Category: flags.AccountCategory,
|
|
|
|
}
|
|
|
|
EthRequiredBlocksFlag = &cli.StringFlag{
|
|
|
|
Name: "eth.requiredblocks",
|
|
|
|
Usage: "Comma separated block number-to-hash mappings to require for peering (<number>=<hash>)",
|
|
|
|
Category: flags.EthCategory,
|
|
|
|
}
|
|
|
|
BloomFilterSizeFlag = &cli.Uint64Flag{
|
|
|
|
Name: "bloomfilter.size",
|
|
|
|
Usage: "Megabytes of memory allocated to bloom-filter for pruning",
|
|
|
|
Value: 2048,
|
|
|
|
Category: flags.EthCategory,
|
|
|
|
}
|
2023-04-26 18:17:37 +03:00
|
|
|
OverrideCancun = &cli.Uint64Flag{
|
|
|
|
Name: "override.cancun",
|
|
|
|
Usage: "Manually specify the Cancun fork timestamp, overriding the bundled setting",
|
2022-08-01 15:13:25 +03:00
|
|
|
Category: flags.EthCategory,
|
|
|
|
}
|
2023-06-28 12:08:48 +03:00
|
|
|
OverrideVerkle = &cli.Uint64Flag{
|
|
|
|
Name: "override.verkle",
|
|
|
|
Usage: "Manually specify the Verkle fork timestamp, overriding the bundled setting",
|
|
|
|
Category: flags.EthCategory,
|
|
|
|
}
|
all: activate pbss as experimental feature (#26274)
* all: activate pbss
* core/rawdb: fix compilation error
* cma, core, eth, les, trie: address comments
* cmd, core, eth, trie: polish code
* core, cmd, eth: address comments
* cmd, core, eth, les, light, tests: address comment
* cmd/utils: shorten log message
* trie/triedb/pathdb: limit node buffer size to 1gb
* cmd/utils: fix opening non-existing db
* cmd/utils: rename flag name
* cmd, core: group chain history flags and fix tests
* core, eth, trie: fix memory leak in snapshot generation
* cmd, eth, internal: deprecate flags
* all: enable state tests for pathdb, fixes
* cmd, core: polish code
* trie/triedb/pathdb: limit the node buffer size to 256mb
---------
Co-authored-by: Martin Holst Swende <martin@swende.se>
Co-authored-by: Péter Szilágyi <peterke@gmail.com>
2023-08-10 22:21:36 +03:00
|
|
|
SyncModeFlag = &flags.TextMarshalerFlag{
|
|
|
|
Name: "syncmode",
|
|
|
|
Usage: `Blockchain sync mode ("snap", "full" or "light")`,
|
|
|
|
Value: &defaultSyncMode,
|
|
|
|
Category: flags.StateCategory,
|
|
|
|
}
|
|
|
|
GCModeFlag = &cli.StringFlag{
|
|
|
|
Name: "gcmode",
|
|
|
|
Usage: `Blockchain garbage collection mode, only relevant in state.scheme=hash ("full", "archive")`,
|
|
|
|
Value: "full",
|
|
|
|
Category: flags.StateCategory,
|
|
|
|
}
|
|
|
|
StateSchemeFlag = &cli.StringFlag{
|
|
|
|
Name: "state.scheme",
|
|
|
|
Usage: "Scheme to use for storing ethereum state ('hash' or 'path')",
|
|
|
|
Value: rawdb.HashScheme,
|
|
|
|
Category: flags.StateCategory,
|
|
|
|
}
|
|
|
|
StateHistoryFlag = &cli.Uint64Flag{
|
|
|
|
Name: "history.state",
|
|
|
|
Usage: "Number of recent blocks to retain state history for (default = 90,000 blocks, 0 = entire chain)",
|
|
|
|
Value: ethconfig.Defaults.StateHistory,
|
|
|
|
Category: flags.StateCategory,
|
|
|
|
}
|
|
|
|
TransactionHistoryFlag = &cli.Uint64Flag{
|
|
|
|
Name: "history.transactions",
|
|
|
|
Usage: "Number of recent blocks to maintain transactions index for (default = about one year, 0 = entire chain)",
|
|
|
|
Value: ethconfig.Defaults.TransactionHistory,
|
|
|
|
Category: flags.StateCategory,
|
|
|
|
}
|
2019-07-10 08:54:06 +03:00
|
|
|
// Light server and client settings
|
2022-06-27 19:22:36 +03:00
|
|
|
LightServeFlag = &cli.IntFlag{
|
|
|
|
Name: "light.serve",
|
|
|
|
Usage: "Maximum percentage of time allowed for serving LES requests (multi-threaded processing allows values over 100)",
|
|
|
|
Value: ethconfig.Defaults.LightServ,
|
|
|
|
Category: flags.LightCategory,
|
|
|
|
}
|
|
|
|
LightIngressFlag = &cli.IntFlag{
|
|
|
|
Name: "light.ingress",
|
|
|
|
Usage: "Incoming bandwidth limit for serving light clients (kilobytes/sec, 0 = unlimited)",
|
|
|
|
Value: ethconfig.Defaults.LightIngress,
|
|
|
|
Category: flags.LightCategory,
|
|
|
|
}
|
|
|
|
LightEgressFlag = &cli.IntFlag{
|
|
|
|
Name: "light.egress",
|
|
|
|
Usage: "Outgoing bandwidth limit for serving light clients (kilobytes/sec, 0 = unlimited)",
|
|
|
|
Value: ethconfig.Defaults.LightEgress,
|
|
|
|
Category: flags.LightCategory,
|
|
|
|
}
|
|
|
|
LightMaxPeersFlag = &cli.IntFlag{
|
|
|
|
Name: "light.maxpeers",
|
|
|
|
Usage: "Maximum number of light clients to serve, or light servers to attach to",
|
|
|
|
Value: ethconfig.Defaults.LightPeers,
|
|
|
|
Category: flags.LightCategory,
|
|
|
|
}
|
|
|
|
LightNoPruneFlag = &cli.BoolFlag{
|
|
|
|
Name: "light.nopruning",
|
|
|
|
Usage: "Disable ancient light chain data pruning",
|
|
|
|
Category: flags.LightCategory,
|
|
|
|
}
|
|
|
|
LightNoSyncServeFlag = &cli.BoolFlag{
|
|
|
|
Name: "light.nosyncserve",
|
|
|
|
Usage: "Enables serving light clients before syncing",
|
|
|
|
Category: flags.LightCategory,
|
2021-02-25 15:55:07 +03:00
|
|
|
}
|
2017-05-26 13:40:47 +03:00
|
|
|
// Transaction pool settings
|
2022-06-27 19:22:36 +03:00
|
|
|
TxPoolLocalsFlag = &cli.StringFlag{
|
|
|
|
Name: "txpool.locals",
|
|
|
|
Usage: "Comma separated accounts to treat as locals (no flush, priority inclusion)",
|
|
|
|
Category: flags.TxPoolCategory,
|
|
|
|
}
|
|
|
|
TxPoolNoLocalsFlag = &cli.BoolFlag{
|
|
|
|
Name: "txpool.nolocals",
|
|
|
|
Usage: "Disables price exemptions for locally submitted transactions",
|
|
|
|
Category: flags.TxPoolCategory,
|
|
|
|
}
|
|
|
|
TxPoolJournalFlag = &cli.StringFlag{
|
|
|
|
Name: "txpool.journal",
|
|
|
|
Usage: "Disk journal for local transaction to survive node restarts",
|
2023-06-16 15:29:40 +03:00
|
|
|
Value: ethconfig.Defaults.TxPool.Journal,
|
2022-06-27 19:22:36 +03:00
|
|
|
Category: flags.TxPoolCategory,
|
|
|
|
}
|
|
|
|
TxPoolRejournalFlag = &cli.DurationFlag{
|
|
|
|
Name: "txpool.rejournal",
|
|
|
|
Usage: "Time interval to regenerate the local transaction journal",
|
2023-06-16 15:29:40 +03:00
|
|
|
Value: ethconfig.Defaults.TxPool.Rejournal,
|
2022-06-27 19:22:36 +03:00
|
|
|
Category: flags.TxPoolCategory,
|
|
|
|
}
|
|
|
|
TxPoolPriceLimitFlag = &cli.Uint64Flag{
|
|
|
|
Name: "txpool.pricelimit",
|
2023-06-16 15:29:40 +03:00
|
|
|
Usage: "Minimum gas price tip to enforce for acceptance into the pool",
|
2022-06-27 19:22:36 +03:00
|
|
|
Value: ethconfig.Defaults.TxPool.PriceLimit,
|
|
|
|
Category: flags.TxPoolCategory,
|
|
|
|
}
|
|
|
|
TxPoolPriceBumpFlag = &cli.Uint64Flag{
|
|
|
|
Name: "txpool.pricebump",
|
|
|
|
Usage: "Price bump percentage to replace an already existing transaction",
|
|
|
|
Value: ethconfig.Defaults.TxPool.PriceBump,
|
|
|
|
Category: flags.TxPoolCategory,
|
|
|
|
}
|
|
|
|
TxPoolAccountSlotsFlag = &cli.Uint64Flag{
|
|
|
|
Name: "txpool.accountslots",
|
|
|
|
Usage: "Minimum number of executable transaction slots guaranteed per account",
|
|
|
|
Value: ethconfig.Defaults.TxPool.AccountSlots,
|
|
|
|
Category: flags.TxPoolCategory,
|
|
|
|
}
|
|
|
|
TxPoolGlobalSlotsFlag = &cli.Uint64Flag{
|
|
|
|
Name: "txpool.globalslots",
|
|
|
|
Usage: "Maximum number of executable transaction slots for all accounts",
|
|
|
|
Value: ethconfig.Defaults.TxPool.GlobalSlots,
|
|
|
|
Category: flags.TxPoolCategory,
|
|
|
|
}
|
|
|
|
TxPoolAccountQueueFlag = &cli.Uint64Flag{
|
|
|
|
Name: "txpool.accountqueue",
|
|
|
|
Usage: "Maximum number of non-executable transaction slots permitted per account",
|
|
|
|
Value: ethconfig.Defaults.TxPool.AccountQueue,
|
|
|
|
Category: flags.TxPoolCategory,
|
|
|
|
}
|
|
|
|
TxPoolGlobalQueueFlag = &cli.Uint64Flag{
|
|
|
|
Name: "txpool.globalqueue",
|
|
|
|
Usage: "Maximum number of non-executable transaction slots for all accounts",
|
|
|
|
Value: ethconfig.Defaults.TxPool.GlobalQueue,
|
|
|
|
Category: flags.TxPoolCategory,
|
|
|
|
}
|
|
|
|
TxPoolLifetimeFlag = &cli.DurationFlag{
|
|
|
|
Name: "txpool.lifetime",
|
|
|
|
Usage: "Maximum amount of time non-executable transaction are queued",
|
|
|
|
Value: ethconfig.Defaults.TxPool.Lifetime,
|
|
|
|
Category: flags.TxPoolCategory,
|
2023-07-27 13:45:35 +03:00
|
|
|
}
|
|
|
|
// Blob transaction pool settings
|
|
|
|
BlobPoolDataDirFlag = &cli.StringFlag{
|
|
|
|
Name: "blobpool.datadir",
|
|
|
|
Usage: "Data directory to store blob transactions in",
|
|
|
|
Value: ethconfig.Defaults.BlobPool.Datadir,
|
|
|
|
Category: flags.BlobPoolCategory,
|
|
|
|
}
|
|
|
|
BlobPoolDataCapFlag = &cli.Uint64Flag{
|
|
|
|
Name: "blobpool.datacap",
|
|
|
|
Usage: "Disk space to allocate for pending blob transactions (soft limit)",
|
|
|
|
Value: ethconfig.Defaults.BlobPool.Datacap,
|
|
|
|
Category: flags.BlobPoolCategory,
|
|
|
|
}
|
|
|
|
BlobPoolPriceBumpFlag = &cli.Uint64Flag{
|
|
|
|
Name: "blobpool.pricebump",
|
|
|
|
Usage: "Price bump percentage to replace an already existing blob transaction",
|
|
|
|
Value: ethconfig.Defaults.BlobPool.PriceBump,
|
|
|
|
Category: flags.BlobPoolCategory,
|
2017-05-26 13:40:47 +03:00
|
|
|
}
|
2016-10-19 14:55:13 +03:00
|
|
|
// Performance tuning settings
|
2022-06-27 19:22:36 +03:00
|
|
|
CacheFlag = &cli.IntFlag{
|
|
|
|
Name: "cache",
|
|
|
|
Usage: "Megabytes of memory allocated to internal caching (default = 4096 mainnet full node, 128 light mode)",
|
|
|
|
Value: 1024,
|
|
|
|
Category: flags.PerfCategory,
|
|
|
|
}
|
|
|
|
CacheDatabaseFlag = &cli.IntFlag{
|
|
|
|
Name: "cache.database",
|
|
|
|
Usage: "Percentage of cache memory allowance to use for database io",
|
|
|
|
Value: 50,
|
|
|
|
Category: flags.PerfCategory,
|
|
|
|
}
|
|
|
|
CacheTrieFlag = &cli.IntFlag{
|
|
|
|
Name: "cache.trie",
|
|
|
|
Usage: "Percentage of cache memory allowance to use for trie caching (default = 15% full mode, 30% archive mode)",
|
|
|
|
Value: 15,
|
|
|
|
Category: flags.PerfCategory,
|
|
|
|
}
|
|
|
|
CacheGCFlag = &cli.IntFlag{
|
|
|
|
Name: "cache.gc",
|
|
|
|
Usage: "Percentage of cache memory allowance to use for trie pruning (default = 25% full mode, 0% archive mode)",
|
|
|
|
Value: 25,
|
|
|
|
Category: flags.PerfCategory,
|
|
|
|
}
|
|
|
|
CacheSnapshotFlag = &cli.IntFlag{
|
|
|
|
Name: "cache.snapshot",
|
|
|
|
Usage: "Percentage of cache memory allowance to use for snapshot caching (default = 10% full mode, 20% archive mode)",
|
|
|
|
Value: 10,
|
|
|
|
Category: flags.PerfCategory,
|
|
|
|
}
|
|
|
|
CacheNoPrefetchFlag = &cli.BoolFlag{
|
|
|
|
Name: "cache.noprefetch",
|
|
|
|
Usage: "Disable heuristic state prefetch during block import (less CPU and disk IO, more time waiting for data)",
|
|
|
|
Category: flags.PerfCategory,
|
|
|
|
}
|
|
|
|
CachePreimagesFlag = &cli.BoolFlag{
|
|
|
|
Name: "cache.preimages",
|
|
|
|
Usage: "Enable recording the SHA3/keccak preimages of trie keys",
|
|
|
|
Category: flags.PerfCategory,
|
|
|
|
}
|
2022-08-19 12:14:59 +03:00
|
|
|
CacheLogSizeFlag = &cli.IntFlag{
|
|
|
|
Name: "cache.blocklogs",
|
|
|
|
Usage: "Size (in number of blocks) of the log cache for filtering",
|
|
|
|
Category: flags.PerfCategory,
|
|
|
|
Value: ethconfig.Defaults.FilterLogCacheSize,
|
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
FDLimitFlag = &cli.IntFlag{
|
|
|
|
Name: "fdlimit",
|
|
|
|
Usage: "Raise the open file descriptor resource limit (default = system fd limit)",
|
|
|
|
Category: flags.PerfCategory,
|
2022-03-07 11:21:06 +03:00
|
|
|
}
|
2023-05-10 14:54:14 +03:00
|
|
|
CryptoKZGFlag = &cli.StringFlag{
|
|
|
|
Name: "crypto.kzg",
|
|
|
|
Usage: "KZG library implementation to use; gokzg (recommended) or ckzg",
|
|
|
|
Value: "gokzg",
|
|
|
|
Category: flags.PerfCategory,
|
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
|
2015-10-29 20:53:24 +03:00
|
|
|
// Miner settings
|
2022-06-27 19:22:36 +03:00
|
|
|
MiningEnabledFlag = &cli.BoolFlag{
|
|
|
|
Name: "mine",
|
|
|
|
Usage: "Enable mining",
|
|
|
|
Category: flags.MinerCategory,
|
|
|
|
}
|
|
|
|
MinerGasLimitFlag = &cli.Uint64Flag{
|
|
|
|
Name: "miner.gaslimit",
|
|
|
|
Usage: "Target gas ceiling for mined blocks",
|
|
|
|
Value: ethconfig.Defaults.Miner.GasCeil,
|
|
|
|
Category: flags.MinerCategory,
|
|
|
|
}
|
|
|
|
MinerGasPriceFlag = &flags.BigFlag{
|
|
|
|
Name: "miner.gasprice",
|
|
|
|
Usage: "Minimum gas price for mining a transaction",
|
|
|
|
Value: ethconfig.Defaults.Miner.GasPrice,
|
|
|
|
Category: flags.MinerCategory,
|
|
|
|
}
|
|
|
|
MinerEtherbaseFlag = &cli.StringFlag{
|
|
|
|
Name: "miner.etherbase",
|
2023-01-20 19:26:01 +03:00
|
|
|
Usage: "0x prefixed public address for block mining rewards",
|
2022-06-27 19:22:36 +03:00
|
|
|
Category: flags.MinerCategory,
|
|
|
|
}
|
|
|
|
MinerExtraDataFlag = &cli.StringFlag{
|
|
|
|
Name: "miner.extradata",
|
|
|
|
Usage: "Block extra data set by the miner (default = client version)",
|
|
|
|
Category: flags.MinerCategory,
|
|
|
|
}
|
|
|
|
MinerRecommitIntervalFlag = &cli.DurationFlag{
|
|
|
|
Name: "miner.recommit",
|
|
|
|
Usage: "Time interval to recreate the block being mined",
|
|
|
|
Value: ethconfig.Defaults.Miner.Recommit,
|
|
|
|
Category: flags.MinerCategory,
|
|
|
|
}
|
2022-10-03 15:10:00 +03:00
|
|
|
MinerNewPayloadTimeout = &cli.DurationFlag{
|
|
|
|
Name: "miner.newpayload-timeout",
|
|
|
|
Usage: "Specify the maximum time allowance for creating a new payload",
|
|
|
|
Value: ethconfig.Defaults.Miner.NewPayloadTimeout,
|
|
|
|
Category: flags.MinerCategory,
|
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
|
2015-10-29 20:53:24 +03:00
|
|
|
// Account settings
|
2022-06-27 19:22:36 +03:00
|
|
|
UnlockedAccountFlag = &cli.StringFlag{
|
|
|
|
Name: "unlock",
|
|
|
|
Usage: "Comma separated list of accounts to unlock",
|
|
|
|
Value: "",
|
|
|
|
Category: flags.AccountCategory,
|
|
|
|
}
|
|
|
|
PasswordFileFlag = &cli.PathFlag{
|
|
|
|
Name: "password",
|
|
|
|
Usage: "Password file to use for non-interactive password input",
|
|
|
|
TakesFile: true,
|
|
|
|
Category: flags.AccountCategory,
|
|
|
|
}
|
|
|
|
ExternalSignerFlag = &cli.StringFlag{
|
|
|
|
Name: "signer",
|
|
|
|
Usage: "External signer (url or path to ipc file)",
|
|
|
|
Value: "",
|
|
|
|
Category: flags.AccountCategory,
|
|
|
|
}
|
|
|
|
InsecureUnlockAllowedFlag = &cli.BoolFlag{
|
|
|
|
Name: "allow-insecure-unlock",
|
|
|
|
Usage: "Allow insecure account unlocking when account-related RPCs are exposed by http",
|
|
|
|
Category: flags.AccountCategory,
|
|
|
|
}
|
|
|
|
|
|
|
|
// EVM settings
|
|
|
|
VMEnableDebugFlag = &cli.BoolFlag{
|
|
|
|
Name: "vmdebug",
|
|
|
|
Usage: "Record information useful for VM and contract debugging",
|
|
|
|
Category: flags.VMCategory,
|
|
|
|
}
|
|
|
|
|
|
|
|
// API options.
|
|
|
|
RPCGlobalGasCapFlag = &cli.Uint64Flag{
|
|
|
|
Name: "rpc.gascap",
|
|
|
|
Usage: "Sets a cap on gas that can be used in eth_call/estimateGas (0=infinite)",
|
|
|
|
Value: ethconfig.Defaults.RPCGasCap,
|
|
|
|
Category: flags.APICategory,
|
|
|
|
}
|
|
|
|
RPCGlobalEVMTimeoutFlag = &cli.DurationFlag{
|
|
|
|
Name: "rpc.evmtimeout",
|
|
|
|
Usage: "Sets a timeout used for eth_call (0=infinite)",
|
|
|
|
Value: ethconfig.Defaults.RPCEVMTimeout,
|
|
|
|
Category: flags.APICategory,
|
|
|
|
}
|
|
|
|
RPCGlobalTxFeeCapFlag = &cli.Float64Flag{
|
|
|
|
Name: "rpc.txfeecap",
|
|
|
|
Usage: "Sets a cap on transaction fee (in ether) that can be sent via the RPC APIs (0 = no cap)",
|
|
|
|
Value: ethconfig.Defaults.RPCTxFeeCap,
|
|
|
|
Category: flags.APICategory,
|
2020-06-17 10:46:31 +03:00
|
|
|
}
|
2022-03-09 16:45:39 +03:00
|
|
|
// Authenticated RPC HTTP settings
|
2022-06-27 19:22:36 +03:00
|
|
|
AuthListenFlag = &cli.StringFlag{
|
|
|
|
Name: "authrpc.addr",
|
|
|
|
Usage: "Listening address for authenticated APIs",
|
|
|
|
Value: node.DefaultConfig.AuthAddr,
|
|
|
|
Category: flags.APICategory,
|
|
|
|
}
|
|
|
|
AuthPortFlag = &cli.IntFlag{
|
|
|
|
Name: "authrpc.port",
|
|
|
|
Usage: "Listening port for authenticated APIs",
|
|
|
|
Value: node.DefaultConfig.AuthPort,
|
|
|
|
Category: flags.APICategory,
|
|
|
|
}
|
|
|
|
AuthVirtualHostsFlag = &cli.StringFlag{
|
|
|
|
Name: "authrpc.vhosts",
|
|
|
|
Usage: "Comma separated list of virtual hostnames from which to accept requests (server enforced). Accepts '*' wildcard.",
|
|
|
|
Value: strings.Join(node.DefaultConfig.AuthVirtualHosts, ","),
|
|
|
|
Category: flags.APICategory,
|
|
|
|
}
|
2022-09-22 16:43:47 +03:00
|
|
|
JWTSecretFlag = &flags.DirectoryFlag{
|
2022-06-27 19:22:36 +03:00
|
|
|
Name: "authrpc.jwtsecret",
|
|
|
|
Usage: "Path to a JWT secret to use for authenticated RPC endpoints",
|
|
|
|
Category: flags.APICategory,
|
2022-03-07 10:30:27 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
|
2016-11-25 18:55:06 +03:00
|
|
|
// Logging and debug settings
|
2022-06-27 19:22:36 +03:00
|
|
|
EthStatsURLFlag = &cli.StringFlag{
|
|
|
|
Name: "ethstats",
|
|
|
|
Usage: "Reporting URL of a ethstats service (nodename:secret@host:port)",
|
|
|
|
Category: flags.MetricsCategory,
|
2016-11-25 18:55:06 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
NoCompactionFlag = &cli.BoolFlag{
|
|
|
|
Name: "nocompaction",
|
|
|
|
Usage: "Disables db compaction after import",
|
|
|
|
Category: flags.LoggingCategory,
|
2017-03-08 14:26:19 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
|
2022-10-28 15:48:08 +03:00
|
|
|
// MISC settings
|
|
|
|
SyncTargetFlag = &cli.PathFlag{
|
|
|
|
Name: "synctarget",
|
|
|
|
Usage: `File for containing the hex-encoded block-rlp as sync target(dev feature)`,
|
|
|
|
TakesFile: true,
|
|
|
|
Category: flags.MiscCategory,
|
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
|
2015-03-06 04:00:41 +02:00
|
|
|
// RPC settings
|
2022-06-27 19:22:36 +03:00
|
|
|
IPCDisabledFlag = &cli.BoolFlag{
|
|
|
|
Name: "ipcdisable",
|
|
|
|
Usage: "Disable the IPC-RPC server",
|
|
|
|
Category: flags.APICategory,
|
|
|
|
}
|
|
|
|
IPCPathFlag = &flags.DirectoryFlag{
|
|
|
|
Name: "ipcpath",
|
|
|
|
Usage: "Filename for IPC socket/pipe within the datadir (explicit paths escape it)",
|
|
|
|
Category: flags.APICategory,
|
|
|
|
}
|
|
|
|
HTTPEnabledFlag = &cli.BoolFlag{
|
|
|
|
Name: "http",
|
|
|
|
Usage: "Enable the HTTP-RPC server",
|
|
|
|
Category: flags.APICategory,
|
|
|
|
}
|
|
|
|
HTTPListenAddrFlag = &cli.StringFlag{
|
|
|
|
Name: "http.addr",
|
|
|
|
Usage: "HTTP-RPC server listening interface",
|
|
|
|
Value: node.DefaultHTTPHost,
|
|
|
|
Category: flags.APICategory,
|
|
|
|
}
|
|
|
|
HTTPPortFlag = &cli.IntFlag{
|
|
|
|
Name: "http.port",
|
|
|
|
Usage: "HTTP-RPC server listening port",
|
|
|
|
Value: node.DefaultHTTPPort,
|
|
|
|
Category: flags.APICategory,
|
|
|
|
}
|
|
|
|
HTTPCORSDomainFlag = &cli.StringFlag{
|
|
|
|
Name: "http.corsdomain",
|
|
|
|
Usage: "Comma separated list of domains from which to accept cross origin requests (browser enforced)",
|
|
|
|
Value: "",
|
|
|
|
Category: flags.APICategory,
|
|
|
|
}
|
|
|
|
HTTPVirtualHostsFlag = &cli.StringFlag{
|
|
|
|
Name: "http.vhosts",
|
|
|
|
Usage: "Comma separated list of virtual hostnames from which to accept requests (server enforced). Accepts '*' wildcard.",
|
|
|
|
Value: strings.Join(node.DefaultConfig.HTTPVirtualHosts, ","),
|
|
|
|
Category: flags.APICategory,
|
|
|
|
}
|
|
|
|
HTTPApiFlag = &cli.StringFlag{
|
|
|
|
Name: "http.api",
|
|
|
|
Usage: "API's offered over the HTTP-RPC interface",
|
|
|
|
Value: "",
|
|
|
|
Category: flags.APICategory,
|
|
|
|
}
|
|
|
|
HTTPPathPrefixFlag = &cli.StringFlag{
|
|
|
|
Name: "http.rpcprefix",
|
|
|
|
Usage: "HTTP path path prefix on which JSON-RPC is served. Use '/' to serve on all paths.",
|
|
|
|
Value: "",
|
|
|
|
Category: flags.APICategory,
|
|
|
|
}
|
|
|
|
GraphQLEnabledFlag = &cli.BoolFlag{
|
|
|
|
Name: "graphql",
|
|
|
|
Usage: "Enable GraphQL on the HTTP-RPC server. Note that GraphQL can only be started if an HTTP server is started as well.",
|
|
|
|
Category: flags.APICategory,
|
|
|
|
}
|
|
|
|
GraphQLCORSDomainFlag = &cli.StringFlag{
|
|
|
|
Name: "graphql.corsdomain",
|
|
|
|
Usage: "Comma separated list of domains from which to accept cross origin requests (browser enforced)",
|
|
|
|
Value: "",
|
|
|
|
Category: flags.APICategory,
|
|
|
|
}
|
|
|
|
GraphQLVirtualHostsFlag = &cli.StringFlag{
|
|
|
|
Name: "graphql.vhosts",
|
|
|
|
Usage: "Comma separated list of virtual hostnames from which to accept requests (server enforced). Accepts '*' wildcard.",
|
|
|
|
Value: strings.Join(node.DefaultConfig.GraphQLVirtualHosts, ","),
|
|
|
|
Category: flags.APICategory,
|
|
|
|
}
|
|
|
|
WSEnabledFlag = &cli.BoolFlag{
|
|
|
|
Name: "ws",
|
|
|
|
Usage: "Enable the WS-RPC server",
|
|
|
|
Category: flags.APICategory,
|
|
|
|
}
|
|
|
|
WSListenAddrFlag = &cli.StringFlag{
|
|
|
|
Name: "ws.addr",
|
|
|
|
Usage: "WS-RPC server listening interface",
|
|
|
|
Value: node.DefaultWSHost,
|
|
|
|
Category: flags.APICategory,
|
|
|
|
}
|
|
|
|
WSPortFlag = &cli.IntFlag{
|
|
|
|
Name: "ws.port",
|
|
|
|
Usage: "WS-RPC server listening port",
|
|
|
|
Value: node.DefaultWSPort,
|
|
|
|
Category: flags.APICategory,
|
|
|
|
}
|
|
|
|
WSApiFlag = &cli.StringFlag{
|
|
|
|
Name: "ws.api",
|
|
|
|
Usage: "API's offered over the WS-RPC interface",
|
|
|
|
Value: "",
|
|
|
|
Category: flags.APICategory,
|
|
|
|
}
|
|
|
|
WSAllowedOriginsFlag = &cli.StringFlag{
|
|
|
|
Name: "ws.origins",
|
|
|
|
Usage: "Origins from which to accept websockets requests",
|
|
|
|
Value: "",
|
|
|
|
Category: flags.APICategory,
|
|
|
|
}
|
|
|
|
WSPathPrefixFlag = &cli.StringFlag{
|
|
|
|
Name: "ws.rpcprefix",
|
|
|
|
Usage: "HTTP path prefix on which JSON-RPC is served. Use '/' to serve on all paths.",
|
|
|
|
Value: "",
|
|
|
|
Category: flags.APICategory,
|
|
|
|
}
|
|
|
|
ExecFlag = &cli.StringFlag{
|
|
|
|
Name: "exec",
|
|
|
|
Usage: "Execute JavaScript statement",
|
|
|
|
Category: flags.APICategory,
|
|
|
|
}
|
|
|
|
PreloadJSFlag = &cli.StringFlag{
|
|
|
|
Name: "preload",
|
|
|
|
Usage: "Comma separated list of JavaScript files to preload into the console",
|
|
|
|
Category: flags.APICategory,
|
|
|
|
}
|
|
|
|
AllowUnprotectedTxs = &cli.BoolFlag{
|
|
|
|
Name: "rpc.allow-unprotected-txs",
|
|
|
|
Usage: "Allow for unprotected (non EIP155 signed) transactions to be submitted via RPC",
|
|
|
|
Category: flags.APICategory,
|
2021-02-23 15:09:19 +03:00
|
|
|
}
|
rpc: add limit for batch request items and response size (#26681)
This PR adds server-side limits for JSON-RPC batch requests. Before this change, batches
were limited only by processing time. The server would pick calls from the batch and
answer them until the response timeout occurred, then stop processing the remaining batch
items.
Here, we are adding two additional limits which can be configured:
- the 'item limit': batches can have at most N items
- the 'response size limit': batches can contain at most X response bytes
These limits are optional in package rpc. In Geth, we set a default limit of 1000 items
and 25MB response size.
When a batch goes over the limit, an error response is returned to the client. However,
doing this correctly isn't always possible. In JSON-RPC, only method calls with a valid
`id` can be responded to. Since batches may also contain non-call messages or
notifications, the best effort thing we can do to report an error with the batch itself is
reporting the limit violation as an error for the first method call in the batch. If a batch is
too large, but contains only notifications and responses, the error will be reported with
a null `id`.
The RPC client was also changed so it can deal with errors resulting from too large
batches. An older client connected to the server code in this PR could get stuck
until the request timeout occurred when the batch is too large. **Upgrading to a version
of the RPC client containing this change is strongly recommended to avoid timeout issues.**
For some weird reason, when writing the original client implementation, @fjl worked off of
the assumption that responses could be distributed across batches arbitrarily. So for a
batch request containing requests `[A B C]`, the server could respond with `[A B C]` but
also with `[A B] [C]` or even `[A] [B] [C]` and it wouldn't make a difference to the
client.
So in the implementation of BatchCallContext, the client waited for all requests in the
batch individually. If the server didn't respond to some of the requests in the batch, the
client would eventually just time out (if a context was used).
With the addition of batch limits into the server, we anticipate that people will hit this
kind of error way more often. To handle this properly, the client now waits for a single
response batch and expects it to contain all responses to the requests.
---------
Co-authored-by: Felix Lange <fjl@twurst.com>
Co-authored-by: Martin Holst Swende <martin@swende.se>
2023-06-13 14:38:58 +03:00
|
|
|
BatchRequestLimit = &cli.IntFlag{
|
|
|
|
Name: "rpc.batch-request-limit",
|
|
|
|
Usage: "Maximum number of requests in a batch",
|
|
|
|
Value: node.DefaultConfig.BatchRequestLimit,
|
|
|
|
Category: flags.APICategory,
|
|
|
|
}
|
|
|
|
BatchResponseMaxSize = &cli.IntFlag{
|
|
|
|
Name: "rpc.batch-response-max-size",
|
|
|
|
Usage: "Maximum number of bytes returned from a batched call",
|
|
|
|
Value: node.DefaultConfig.BatchResponseMaxSize,
|
|
|
|
Category: flags.APICategory,
|
|
|
|
}
|
2023-02-02 14:52:19 +03:00
|
|
|
EnablePersonal = &cli.BoolFlag{
|
|
|
|
Name: "rpc.enabledeprecatedpersonal",
|
|
|
|
Usage: "Enables the (deprecated) personal namespace",
|
|
|
|
Category: flags.APICategory,
|
|
|
|
}
|
2016-01-26 15:39:21 +02:00
|
|
|
|
2015-03-06 04:00:41 +02:00
|
|
|
// Network Settings
|
2022-06-27 19:22:36 +03:00
|
|
|
MaxPeersFlag = &cli.IntFlag{
|
|
|
|
Name: "maxpeers",
|
|
|
|
Usage: "Maximum number of network peers (network disabled if set to 0)",
|
|
|
|
Value: node.DefaultConfig.P2P.MaxPeers,
|
|
|
|
Category: flags.NetworkingCategory,
|
|
|
|
}
|
|
|
|
MaxPendingPeersFlag = &cli.IntFlag{
|
|
|
|
Name: "maxpendpeers",
|
|
|
|
Usage: "Maximum number of pending connection attempts (defaults used if set to 0)",
|
|
|
|
Value: node.DefaultConfig.P2P.MaxPendingPeers,
|
|
|
|
Category: flags.NetworkingCategory,
|
|
|
|
}
|
|
|
|
ListenPortFlag = &cli.IntFlag{
|
|
|
|
Name: "port",
|
|
|
|
Usage: "Network listening port",
|
|
|
|
Value: 30303,
|
|
|
|
Category: flags.NetworkingCategory,
|
|
|
|
}
|
|
|
|
BootnodesFlag = &cli.StringFlag{
|
|
|
|
Name: "bootnodes",
|
|
|
|
Usage: "Comma separated enode URLs for P2P discovery bootstrap",
|
|
|
|
Value: "",
|
|
|
|
Category: flags.NetworkingCategory,
|
|
|
|
}
|
|
|
|
NodeKeyFileFlag = &cli.StringFlag{
|
|
|
|
Name: "nodekey",
|
|
|
|
Usage: "P2P node key file",
|
|
|
|
Category: flags.NetworkingCategory,
|
|
|
|
}
|
|
|
|
NodeKeyHexFlag = &cli.StringFlag{
|
|
|
|
Name: "nodekeyhex",
|
|
|
|
Usage: "P2P node key as hex (for testing)",
|
|
|
|
Category: flags.NetworkingCategory,
|
|
|
|
}
|
|
|
|
NATFlag = &cli.StringFlag{
|
|
|
|
Name: "nat",
|
2023-01-16 13:21:41 +03:00
|
|
|
Usage: "NAT port mapping mechanism (any|none|upnp|pmp|pmp:<IP>|extip:<IP>)",
|
2022-06-27 19:22:36 +03:00
|
|
|
Value: "any",
|
|
|
|
Category: flags.NetworkingCategory,
|
|
|
|
}
|
|
|
|
NoDiscoverFlag = &cli.BoolFlag{
|
|
|
|
Name: "nodiscover",
|
|
|
|
Usage: "Disables the peer discovery mechanism (manual peer addition)",
|
|
|
|
Category: flags.NetworkingCategory,
|
|
|
|
}
|
2023-07-11 22:21:32 +03:00
|
|
|
DiscoveryV4Flag = &cli.BoolFlag{
|
|
|
|
Name: "discovery.v4",
|
|
|
|
Aliases: []string{"discv4"},
|
|
|
|
Usage: "Enables the V4 discovery mechanism",
|
|
|
|
Category: flags.NetworkingCategory,
|
|
|
|
Value: true,
|
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
DiscoveryV5Flag = &cli.BoolFlag{
|
2023-07-11 22:21:32 +03:00
|
|
|
Name: "discovery.v5",
|
|
|
|
Aliases: []string{"discv5"},
|
2022-06-27 19:22:36 +03:00
|
|
|
Usage: "Enables the experimental RLPx V5 (Topic Discovery) mechanism",
|
|
|
|
Category: flags.NetworkingCategory,
|
|
|
|
}
|
|
|
|
NetrestrictFlag = &cli.StringFlag{
|
|
|
|
Name: "netrestrict",
|
|
|
|
Usage: "Restricts network communication to the given IP networks (CIDR masks)",
|
|
|
|
Category: flags.NetworkingCategory,
|
|
|
|
}
|
|
|
|
DNSDiscoveryFlag = &cli.StringFlag{
|
|
|
|
Name: "discovery.dns",
|
|
|
|
Usage: "Sets DNS discovery entry points (use \"\" to disable DNS)",
|
|
|
|
Category: flags.NetworkingCategory,
|
|
|
|
}
|
2022-06-28 18:25:47 +03:00
|
|
|
DiscoveryPortFlag = &cli.IntFlag{
|
|
|
|
Name: "discovery.port",
|
|
|
|
Usage: "Use a custom UDP port for P2P discovery",
|
|
|
|
Value: 30303,
|
|
|
|
Category: flags.NetworkingCategory,
|
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
|
|
|
|
// Console
|
|
|
|
JSpathFlag = &flags.DirectoryFlag{
|
|
|
|
Name: "jspath",
|
|
|
|
Usage: "JavaScript root path for `loadScript`",
|
|
|
|
Value: flags.DirectoryString("."),
|
|
|
|
Category: flags.APICategory,
|
2015-03-15 08:31:40 +02:00
|
|
|
}
|
2022-10-06 20:59:23 +03:00
|
|
|
HttpHeaderFlag = &cli.StringSliceFlag{
|
|
|
|
Name: "header",
|
|
|
|
Aliases: []string{"H"},
|
|
|
|
Usage: "Pass custom headers to the RPC server when using --" + RemoteDBFlag.Name + " or the geth attach console. This flag can be given multiple times.",
|
|
|
|
Category: flags.APICategory,
|
|
|
|
}
|
2015-10-29 20:53:24 +03:00
|
|
|
|
|
|
|
// Gas price oracle settings
|
2022-06-27 19:22:36 +03:00
|
|
|
GpoBlocksFlag = &cli.IntFlag{
|
|
|
|
Name: "gpo.blocks",
|
|
|
|
Usage: "Number of recent blocks to check for gas prices",
|
|
|
|
Value: ethconfig.Defaults.GPO.Blocks,
|
|
|
|
Category: flags.GasPriceCategory,
|
|
|
|
}
|
|
|
|
GpoPercentileFlag = &cli.IntFlag{
|
|
|
|
Name: "gpo.percentile",
|
|
|
|
Usage: "Suggested gas price is the given percentile of a set of recent transaction gas prices",
|
|
|
|
Value: ethconfig.Defaults.GPO.Percentile,
|
|
|
|
Category: flags.GasPriceCategory,
|
|
|
|
}
|
|
|
|
GpoMaxGasPriceFlag = &cli.Int64Flag{
|
|
|
|
Name: "gpo.maxprice",
|
|
|
|
Usage: "Maximum transaction priority fee (or gasprice before London fork) to be recommended by gpo",
|
|
|
|
Value: ethconfig.Defaults.GPO.MaxPrice.Int64(),
|
|
|
|
Category: flags.GasPriceCategory,
|
|
|
|
}
|
|
|
|
GpoIgnoreGasPriceFlag = &cli.Int64Flag{
|
|
|
|
Name: "gpo.ignoreprice",
|
|
|
|
Usage: "Gas price below which gpo will ignore transactions",
|
|
|
|
Value: ethconfig.Defaults.GPO.IgnorePrice.Int64(),
|
|
|
|
Category: flags.GasPriceCategory,
|
2021-05-11 12:25:51 +03:00
|
|
|
}
|
2018-07-02 15:51:02 +03:00
|
|
|
|
|
|
|
// Metrics flags
|
2022-06-27 19:22:36 +03:00
|
|
|
MetricsEnabledFlag = &cli.BoolFlag{
|
|
|
|
Name: "metrics",
|
|
|
|
Usage: "Enable metrics collection and reporting",
|
|
|
|
Category: flags.MetricsCategory,
|
2018-07-02 15:51:02 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
MetricsEnabledExpensiveFlag = &cli.BoolFlag{
|
|
|
|
Name: "metrics.expensive",
|
|
|
|
Usage: "Enable expensive metrics collection and reporting",
|
|
|
|
Category: flags.MetricsCategory,
|
2019-03-25 11:01:18 +03:00
|
|
|
}
|
2020-07-03 20:12:22 +03:00
|
|
|
|
|
|
|
// MetricsHTTPFlag defines the endpoint for a stand-alone metrics HTTP endpoint.
|
|
|
|
// Since the pprof service enables sensitive/vulnerable behavior, this allows a user
|
|
|
|
// to enable a public-OK metrics endpoint without having to worry about ALSO exposing
|
|
|
|
// other profiling behavior or information.
|
2022-06-27 19:22:36 +03:00
|
|
|
MetricsHTTPFlag = &cli.StringFlag{
|
2022-11-24 15:03:38 +03:00
|
|
|
Name: "metrics.addr",
|
|
|
|
Usage: `Enable stand-alone metrics HTTP server listening interface.`,
|
2022-06-27 19:22:36 +03:00
|
|
|
Category: flags.MetricsCategory,
|
|
|
|
}
|
|
|
|
MetricsPortFlag = &cli.IntFlag{
|
2022-11-24 13:37:58 +03:00
|
|
|
Name: "metrics.port",
|
|
|
|
Usage: `Metrics HTTP server listening port.
|
|
|
|
Please note that --` + MetricsHTTPFlag.Name + ` must be set to start the server.`,
|
2022-06-27 19:22:36 +03:00
|
|
|
Value: metrics.DefaultConfig.Port,
|
|
|
|
Category: flags.MetricsCategory,
|
|
|
|
}
|
|
|
|
MetricsEnableInfluxDBFlag = &cli.BoolFlag{
|
|
|
|
Name: "metrics.influxdb",
|
|
|
|
Usage: "Enable metrics export/push to an external InfluxDB database",
|
|
|
|
Category: flags.MetricsCategory,
|
|
|
|
}
|
|
|
|
MetricsInfluxDBEndpointFlag = &cli.StringFlag{
|
|
|
|
Name: "metrics.influxdb.endpoint",
|
|
|
|
Usage: "InfluxDB API endpoint to report metrics to",
|
|
|
|
Value: metrics.DefaultConfig.InfluxDBEndpoint,
|
|
|
|
Category: flags.MetricsCategory,
|
|
|
|
}
|
|
|
|
MetricsInfluxDBDatabaseFlag = &cli.StringFlag{
|
|
|
|
Name: "metrics.influxdb.database",
|
|
|
|
Usage: "InfluxDB database name to push reported metrics to",
|
|
|
|
Value: metrics.DefaultConfig.InfluxDBDatabase,
|
|
|
|
Category: flags.MetricsCategory,
|
|
|
|
}
|
|
|
|
MetricsInfluxDBUsernameFlag = &cli.StringFlag{
|
|
|
|
Name: "metrics.influxdb.username",
|
|
|
|
Usage: "Username to authorize access to the database",
|
|
|
|
Value: metrics.DefaultConfig.InfluxDBUsername,
|
|
|
|
Category: flags.MetricsCategory,
|
|
|
|
}
|
|
|
|
MetricsInfluxDBPasswordFlag = &cli.StringFlag{
|
|
|
|
Name: "metrics.influxdb.password",
|
|
|
|
Usage: "Password to authorize access to the database",
|
|
|
|
Value: metrics.DefaultConfig.InfluxDBPassword,
|
|
|
|
Category: flags.MetricsCategory,
|
2018-07-02 15:51:02 +03:00
|
|
|
}
|
2019-01-29 11:14:24 +03:00
|
|
|
// Tags are part of every measurement sent to InfluxDB. Queries on tags are faster in InfluxDB.
|
|
|
|
// For example `host` tag could be used so that we can group all nodes and average a measurement
|
|
|
|
// across all of them, but also so that we can select a specific node and inspect its measurements.
|
2018-07-02 15:51:02 +03:00
|
|
|
// https://docs.influxdata.com/influxdb/v1.4/concepts/key_concepts/#tag-key
|
2022-06-27 19:22:36 +03:00
|
|
|
MetricsInfluxDBTagsFlag = &cli.StringFlag{
|
|
|
|
Name: "metrics.influxdb.tags",
|
|
|
|
Usage: "Comma-separated InfluxDB tags (key/values) attached to all measurements",
|
|
|
|
Value: metrics.DefaultConfig.InfluxDBTags,
|
|
|
|
Category: flags.MetricsCategory,
|
2018-07-02 15:51:02 +03:00
|
|
|
}
|
2021-04-16 22:29:22 +03:00
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
MetricsEnableInfluxDBV2Flag = &cli.BoolFlag{
|
|
|
|
Name: "metrics.influxdbv2",
|
|
|
|
Usage: "Enable metrics export/push to an external InfluxDB v2 database",
|
|
|
|
Category: flags.MetricsCategory,
|
2021-08-17 19:40:14 +03:00
|
|
|
}
|
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
MetricsInfluxDBTokenFlag = &cli.StringFlag{
|
|
|
|
Name: "metrics.influxdb.token",
|
|
|
|
Usage: "Token to authorize access to the database (v2 only)",
|
|
|
|
Value: metrics.DefaultConfig.InfluxDBToken,
|
|
|
|
Category: flags.MetricsCategory,
|
2021-08-17 19:40:14 +03:00
|
|
|
}
|
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
MetricsInfluxDBBucketFlag = &cli.StringFlag{
|
|
|
|
Name: "metrics.influxdb.bucket",
|
|
|
|
Usage: "InfluxDB bucket name to push reported metrics to (v2 only)",
|
|
|
|
Value: metrics.DefaultConfig.InfluxDBBucket,
|
|
|
|
Category: flags.MetricsCategory,
|
2021-08-17 19:40:14 +03:00
|
|
|
}
|
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
MetricsInfluxDBOrganizationFlag = &cli.StringFlag{
|
|
|
|
Name: "metrics.influxdb.organization",
|
|
|
|
Usage: "InfluxDB organization name (v2 only)",
|
|
|
|
Value: metrics.DefaultConfig.InfluxDBOrganization,
|
|
|
|
Category: flags.MetricsCategory,
|
2021-08-17 19:40:14 +03:00
|
|
|
}
|
2015-03-06 04:00:41 +02:00
|
|
|
)
|
|
|
|
|
2022-05-03 09:46:17 +03:00
|
|
|
var (
|
|
|
|
// TestnetFlags is the flag group of all built-in supported testnets.
|
|
|
|
TestnetFlags = []cli.Flag{
|
|
|
|
GoerliFlag,
|
|
|
|
SepoliaFlag,
|
|
|
|
}
|
|
|
|
// NetworkFlags is the flag group of all built-in supported networks.
|
2022-09-26 14:55:18 +03:00
|
|
|
NetworkFlags = append([]cli.Flag{MainnetFlag}, TestnetFlags...)
|
2022-05-03 09:46:17 +03:00
|
|
|
|
|
|
|
// DatabasePathFlags is the flag group of all database path flags.
|
|
|
|
DatabasePathFlags = []cli.Flag{
|
|
|
|
DataDirFlag,
|
|
|
|
AncientFlag,
|
2022-05-18 17:27:17 +03:00
|
|
|
RemoteDBFlag,
|
2022-09-30 14:50:25 +03:00
|
|
|
HttpHeaderFlag,
|
2022-05-03 09:46:17 +03:00
|
|
|
}
|
|
|
|
)
|
|
|
|
|
2023-02-09 11:48:34 +03:00
|
|
|
func init() {
|
|
|
|
if rawdb.PebbleEnabled {
|
|
|
|
DatabasePathFlags = append(DatabasePathFlags, DBEngineFlag)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-08-18 14:28:17 +03:00
|
|
|
// MakeDataDir retrieves the currently requested data directory, terminating
|
2015-11-17 18:33:25 +02:00
|
|
|
// if none (or the empty string) is specified. If the node is starting a testnet,
|
2020-04-09 12:09:58 +03:00
|
|
|
// then a subdirectory of the specified datadir will be used.
|
2016-08-18 14:28:17 +03:00
|
|
|
func MakeDataDir(ctx *cli.Context) string {
|
2022-06-27 19:22:36 +03:00
|
|
|
if path := ctx.String(DataDirFlag.Name); path != "" {
|
|
|
|
if ctx.Bool(GoerliFlag.Name) {
|
2018-11-16 18:58:24 +03:00
|
|
|
return filepath.Join(path, "goerli")
|
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.Bool(SepoliaFlag.Name) {
|
2021-11-08 14:06:01 +03:00
|
|
|
return filepath.Join(path, "sepolia")
|
|
|
|
}
|
2015-11-17 18:33:25 +02:00
|
|
|
return path
|
2015-03-06 04:00:41 +02:00
|
|
|
}
|
2017-02-22 18:22:50 +03:00
|
|
|
Fatalf("Cannot determine default data directory, please set manually (--datadir)")
|
2015-11-17 18:33:25 +02:00
|
|
|
return ""
|
2015-03-06 04:00:41 +02:00
|
|
|
}
|
|
|
|
|
2017-04-12 17:27:23 +03:00
|
|
|
// setNodeKey creates a node key from set command line flags, either loading it
|
2015-11-17 18:33:25 +02:00
|
|
|
// from a file or as a specified hex value. If neither flags were provided, this
|
|
|
|
// method returns nil and an emphemeral key is to be generated.
|
2017-04-12 17:27:23 +03:00
|
|
|
func setNodeKey(ctx *cli.Context, cfg *p2p.Config) {
|
2015-11-17 18:33:25 +02:00
|
|
|
var (
|
2022-06-27 19:22:36 +03:00
|
|
|
hex = ctx.String(NodeKeyHexFlag.Name)
|
|
|
|
file = ctx.String(NodeKeyFileFlag.Name)
|
2017-04-12 17:27:23 +03:00
|
|
|
key *ecdsa.PrivateKey
|
|
|
|
err error
|
2015-11-17 18:33:25 +02:00
|
|
|
)
|
2015-03-06 04:00:41 +02:00
|
|
|
switch {
|
|
|
|
case file != "" && hex != "":
|
2017-02-22 18:22:50 +03:00
|
|
|
Fatalf("Options %q and %q are mutually exclusive", NodeKeyFileFlag.Name, NodeKeyHexFlag.Name)
|
2015-03-06 04:00:41 +02:00
|
|
|
case file != "":
|
|
|
|
if key, err = crypto.LoadECDSA(file); err != nil {
|
2017-02-22 18:22:50 +03:00
|
|
|
Fatalf("Option %q: %v", NodeKeyFileFlag.Name, err)
|
2015-03-06 04:00:41 +02:00
|
|
|
}
|
2017-04-12 17:27:23 +03:00
|
|
|
cfg.PrivateKey = key
|
2015-03-06 04:00:41 +02:00
|
|
|
case hex != "":
|
|
|
|
if key, err = crypto.HexToECDSA(hex); err != nil {
|
2017-02-22 18:22:50 +03:00
|
|
|
Fatalf("Option %q: %v", NodeKeyHexFlag.Name, err)
|
2015-03-06 04:00:41 +02:00
|
|
|
}
|
2017-04-12 17:27:23 +03:00
|
|
|
cfg.PrivateKey = key
|
2015-03-06 04:00:41 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-04-12 17:27:23 +03:00
|
|
|
// setNodeUserIdent creates the user identifier from CLI flags.
|
|
|
|
func setNodeUserIdent(ctx *cli.Context, cfg *node.Config) {
|
2022-06-27 19:22:36 +03:00
|
|
|
if identity := ctx.String(IdentityFlag.Name); len(identity) > 0 {
|
2017-04-12 17:27:23 +03:00
|
|
|
cfg.UserIdent = identity
|
2015-11-17 18:33:25 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-04-12 17:27:23 +03:00
|
|
|
// setBootstrapNodes creates a list of bootstrap nodes from the command line
|
2015-11-17 18:33:25 +02:00
|
|
|
// flags, reverting to pre-configured ones if none have been specified.
|
2017-04-12 17:27:23 +03:00
|
|
|
func setBootstrapNodes(ctx *cli.Context, cfg *p2p.Config) {
|
2017-01-05 15:56:06 +03:00
|
|
|
urls := params.MainnetBootnodes
|
2017-05-04 12:36:20 +03:00
|
|
|
switch {
|
2022-06-27 19:22:36 +03:00
|
|
|
case ctx.IsSet(BootnodesFlag.Name):
|
|
|
|
urls = SplitAndTrim(ctx.String(BootnodesFlag.Name))
|
|
|
|
case ctx.Bool(SepoliaFlag.Name):
|
2021-11-08 14:06:01 +03:00
|
|
|
urls = params.SepoliaBootnodes
|
2022-06-27 19:22:36 +03:00
|
|
|
case ctx.Bool(GoerliFlag.Name):
|
2018-11-16 18:58:24 +03:00
|
|
|
urls = params.GoerliBootnodes
|
2022-06-29 12:57:12 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// don't apply defaults if BootstrapNodes is already set
|
|
|
|
if cfg.BootstrapNodes != nil {
|
|
|
|
return
|
2015-11-17 18:33:25 +02:00
|
|
|
}
|
|
|
|
|
all: new p2p node representation (#17643)
Package p2p/enode provides a generalized representation of p2p nodes
which can contain arbitrary information in key/value pairs. It is also
the new home for the node database. The "v4" identity scheme is also
moved here from p2p/enr to remove the dependency on Ethereum crypto from
that package.
Record signature handling is changed significantly. The identity scheme
registry is removed and acceptable schemes must be passed to any method
that needs identity. This means records must now be validated explicitly
after decoding.
The enode API is designed to make signature handling easy and safe: most
APIs around the codebase work with enode.Node, which is a wrapper around
a valid record. Going from enr.Record to enode.Node requires a valid
signature.
* p2p/discover: port to p2p/enode
This ports the discovery code to the new node representation in
p2p/enode. The wire protocol is unchanged, this can be considered a
refactoring change. The Kademlia table can now deal with nodes using an
arbitrary identity scheme. This requires a few incompatible API changes:
- Table.Lookup is not available anymore. It used to take a public key
as argument because v4 protocol requires one. Its replacement is
LookupRandom.
- Table.Resolve takes *enode.Node instead of NodeID. This is also for
v4 protocol compatibility because nodes cannot be looked up by ID
alone.
- Types Node and NodeID are gone. Further commits in the series will be
fixes all over the the codebase to deal with those removals.
* p2p: port to p2p/enode and discovery changes
This adapts package p2p to the changes in p2p/discover. All uses of
discover.Node and discover.NodeID are replaced by their equivalents from
p2p/enode.
New API is added to retrieve the enode.Node instance of a peer. The
behavior of Server.Self with discovery disabled is improved. It now
tries much harder to report a working IP address, falling back to
127.0.0.1 if no suitable address can be determined through other means.
These changes were needed for tests of other packages later in the
series.
* p2p/simulations, p2p/testing: port to p2p/enode
No surprises here, mostly replacements of discover.Node, discover.NodeID
with their new equivalents. The 'interesting' API changes are:
- testing.ProtocolSession tracks complete nodes, not just their IDs.
- adapters.NodeConfig has a new method to create a complete node.
These changes were needed to make swarm tests work.
Note that the NodeID change makes the code incompatible with old
simulation snapshots.
* whisper/whisperv5, whisper/whisperv6: port to p2p/enode
This port was easy because whisper uses []byte for node IDs and
URL strings in the API.
* eth: port to p2p/enode
Again, easy to port because eth uses strings for node IDs and doesn't
care about node information in any way.
* les: port to p2p/enode
Apart from replacing discover.NodeID with enode.ID, most changes are in
the server pool code. It now deals with complete nodes instead
of (Pubkey, IP, Port) triples. The database format is unchanged for now,
but we should probably change it to use the node database later.
* node: port to p2p/enode
This change simply replaces discover.Node and discover.NodeID with their
new equivalents.
* swarm/network: port to p2p/enode
Swarm has its own node address representation, BzzAddr, containing both
an overlay address (the hash of a secp256k1 public key) and an underlay
address (enode:// URL).
There are no changes to the BzzAddr format in this commit, but certain
operations such as creating a BzzAddr from a node ID are now impossible
because node IDs aren't public keys anymore.
Most swarm-related changes in the series remove uses of
NewAddrFromNodeID, replacing it with NewAddr which takes a complete node
as argument. ToOverlayAddr is removed because we can just use the node
ID directly.
2018-09-25 01:59:00 +03:00
|
|
|
cfg.BootstrapNodes = make([]*enode.Node, 0, len(urls))
|
2017-01-05 15:56:06 +03:00
|
|
|
for _, url := range urls {
|
2019-01-24 15:02:30 +03:00
|
|
|
if url != "" {
|
2019-06-07 16:31:00 +03:00
|
|
|
node, err := enode.Parse(enode.ValidSchemes, url)
|
2019-01-24 15:02:30 +03:00
|
|
|
if err != nil {
|
|
|
|
log.Crit("Bootstrap URL invalid", "enode", url, "err", err)
|
2019-03-15 08:20:21 +03:00
|
|
|
continue
|
2019-01-24 15:02:30 +03:00
|
|
|
}
|
|
|
|
cfg.BootstrapNodes = append(cfg.BootstrapNodes, node)
|
2015-11-17 18:33:25 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-04-12 17:27:23 +03:00
|
|
|
// setBootstrapNodesV5 creates a list of bootstrap nodes from the command line
|
2016-11-09 17:35:04 +03:00
|
|
|
// flags, reverting to pre-configured ones if none have been specified.
|
2017-04-12 17:27:23 +03:00
|
|
|
func setBootstrapNodesV5(ctx *cli.Context, cfg *p2p.Config) {
|
2021-01-26 23:41:35 +03:00
|
|
|
urls := params.V5Bootnodes
|
2017-05-04 12:36:20 +03:00
|
|
|
switch {
|
2022-06-27 19:22:36 +03:00
|
|
|
case ctx.IsSet(BootnodesFlag.Name):
|
|
|
|
urls = SplitAndTrim(ctx.String(BootnodesFlag.Name))
|
2017-05-04 12:36:20 +03:00
|
|
|
case cfg.BootstrapNodesV5 != nil:
|
2017-04-12 17:27:23 +03:00
|
|
|
return // already set, don't apply defaults.
|
2016-11-09 17:35:04 +03:00
|
|
|
}
|
|
|
|
|
2021-01-26 23:41:35 +03:00
|
|
|
cfg.BootstrapNodesV5 = make([]*enode.Node, 0, len(urls))
|
2017-01-05 15:56:06 +03:00
|
|
|
for _, url := range urls {
|
2019-03-15 08:20:21 +03:00
|
|
|
if url != "" {
|
2021-01-26 23:41:35 +03:00
|
|
|
node, err := enode.Parse(enode.ValidSchemes, url)
|
2019-03-15 08:20:21 +03:00
|
|
|
if err != nil {
|
|
|
|
log.Error("Bootstrap URL invalid", "enode", url, "err", err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
cfg.BootstrapNodesV5 = append(cfg.BootstrapNodesV5, node)
|
2016-11-09 17:35:04 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-06-28 18:25:47 +03:00
|
|
|
// setListenAddress creates TCP/UDP listening address strings from set command
|
|
|
|
// line flags
|
2017-04-12 17:27:23 +03:00
|
|
|
func setListenAddress(ctx *cli.Context, cfg *p2p.Config) {
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(ListenPortFlag.Name) {
|
|
|
|
cfg.ListenAddr = fmt.Sprintf(":%d", ctx.Int(ListenPortFlag.Name))
|
2017-04-12 17:27:23 +03:00
|
|
|
}
|
2022-06-28 18:25:47 +03:00
|
|
|
if ctx.IsSet(DiscoveryPortFlag.Name) {
|
|
|
|
cfg.DiscAddr = fmt.Sprintf(":%d", ctx.Int(DiscoveryPortFlag.Name))
|
|
|
|
}
|
2015-11-17 18:33:25 +02:00
|
|
|
}
|
|
|
|
|
2017-04-12 17:27:23 +03:00
|
|
|
// setNAT creates a port mapper from command line flags.
|
|
|
|
func setNAT(ctx *cli.Context, cfg *p2p.Config) {
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(NATFlag.Name) {
|
|
|
|
natif, err := nat.Parse(ctx.String(NATFlag.Name))
|
2017-04-12 17:27:23 +03:00
|
|
|
if err != nil {
|
|
|
|
Fatalf("Option %s: %v", NATFlag.Name, err)
|
|
|
|
}
|
|
|
|
cfg.NAT = natif
|
2015-11-17 18:33:25 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-09-23 00:22:54 +03:00
|
|
|
// SplitAndTrim splits input separated by a comma
|
2017-04-13 00:04:14 +03:00
|
|
|
// and trims excessive white space from the substrings.
|
2020-09-23 00:22:54 +03:00
|
|
|
func SplitAndTrim(input string) (ret []string) {
|
2020-07-06 23:09:30 +03:00
|
|
|
l := strings.Split(input, ",")
|
|
|
|
for _, r := range l {
|
2020-09-23 00:22:54 +03:00
|
|
|
if r = strings.TrimSpace(r); r != "" {
|
2020-07-06 23:09:30 +03:00
|
|
|
ret = append(ret, r)
|
|
|
|
}
|
2016-04-14 17:18:35 +03:00
|
|
|
}
|
2020-07-06 23:09:30 +03:00
|
|
|
return ret
|
2016-04-14 17:18:35 +03:00
|
|
|
}
|
|
|
|
|
2017-04-12 17:27:23 +03:00
|
|
|
// setHTTP creates the HTTP RPC listener interface string from the set
|
2016-02-05 13:45:36 +02:00
|
|
|
// command line flags, returning empty if the HTTP endpoint is disabled.
|
2017-04-12 17:27:23 +03:00
|
|
|
func setHTTP(ctx *cli.Context, cfg *node.Config) {
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.Bool(HTTPEnabledFlag.Name) && cfg.HTTPHost == "" {
|
2020-05-05 11:19:17 +03:00
|
|
|
cfg.HTTPHost = "127.0.0.1"
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(HTTPListenAddrFlag.Name) {
|
|
|
|
cfg.HTTPHost = ctx.String(HTTPListenAddrFlag.Name)
|
2020-05-05 11:19:17 +03:00
|
|
|
}
|
2017-04-12 17:27:23 +03:00
|
|
|
}
|
2020-05-05 11:19:17 +03:00
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(HTTPPortFlag.Name) {
|
|
|
|
cfg.HTTPPort = ctx.Int(HTTPPortFlag.Name)
|
2016-02-05 13:45:36 +02:00
|
|
|
}
|
2020-05-05 11:19:17 +03:00
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(AuthListenFlag.Name) {
|
|
|
|
cfg.AuthAddr = ctx.String(AuthListenFlag.Name)
|
2022-03-09 16:45:39 +03:00
|
|
|
}
|
2022-03-17 18:20:03 +03:00
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(AuthPortFlag.Name) {
|
|
|
|
cfg.AuthPort = ctx.Int(AuthPortFlag.Name)
|
2022-03-07 10:30:27 +03:00
|
|
|
}
|
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(AuthVirtualHostsFlag.Name) {
|
|
|
|
cfg.AuthVirtualHosts = SplitAndTrim(ctx.String(AuthVirtualHostsFlag.Name))
|
2022-03-17 18:20:03 +03:00
|
|
|
}
|
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(HTTPCORSDomainFlag.Name) {
|
|
|
|
cfg.HTTPCors = SplitAndTrim(ctx.String(HTTPCORSDomainFlag.Name))
|
2020-05-05 11:19:17 +03:00
|
|
|
}
|
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(HTTPApiFlag.Name) {
|
|
|
|
cfg.HTTPModules = SplitAndTrim(ctx.String(HTTPApiFlag.Name))
|
2020-05-05 11:19:17 +03:00
|
|
|
}
|
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(HTTPVirtualHostsFlag.Name) {
|
|
|
|
cfg.HTTPVirtualHosts = SplitAndTrim(ctx.String(HTTPVirtualHostsFlag.Name))
|
2018-03-05 14:02:32 +03:00
|
|
|
}
|
2021-02-02 12:05:46 +03:00
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(HTTPPathPrefixFlag.Name) {
|
|
|
|
cfg.HTTPPathPrefix = ctx.String(HTTPPathPrefixFlag.Name)
|
2021-02-02 12:05:46 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(AllowUnprotectedTxs.Name) {
|
|
|
|
cfg.AllowUnprotectedTxs = ctx.Bool(AllowUnprotectedTxs.Name)
|
2021-02-23 15:09:19 +03:00
|
|
|
}
|
rpc: add limit for batch request items and response size (#26681)
This PR adds server-side limits for JSON-RPC batch requests. Before this change, batches
were limited only by processing time. The server would pick calls from the batch and
answer them until the response timeout occurred, then stop processing the remaining batch
items.
Here, we are adding two additional limits which can be configured:
- the 'item limit': batches can have at most N items
- the 'response size limit': batches can contain at most X response bytes
These limits are optional in package rpc. In Geth, we set a default limit of 1000 items
and 25MB response size.
When a batch goes over the limit, an error response is returned to the client. However,
doing this correctly isn't always possible. In JSON-RPC, only method calls with a valid
`id` can be responded to. Since batches may also contain non-call messages or
notifications, the best effort thing we can do to report an error with the batch itself is
reporting the limit violation as an error for the first method call in the batch. If a batch is
too large, but contains only notifications and responses, the error will be reported with
a null `id`.
The RPC client was also changed so it can deal with errors resulting from too large
batches. An older client connected to the server code in this PR could get stuck
until the request timeout occurred when the batch is too large. **Upgrading to a version
of the RPC client containing this change is strongly recommended to avoid timeout issues.**
For some weird reason, when writing the original client implementation, @fjl worked off of
the assumption that responses could be distributed across batches arbitrarily. So for a
batch request containing requests `[A B C]`, the server could respond with `[A B C]` but
also with `[A B] [C]` or even `[A] [B] [C]` and it wouldn't make a difference to the
client.
So in the implementation of BatchCallContext, the client waited for all requests in the
batch individually. If the server didn't respond to some of the requests in the batch, the
client would eventually just time out (if a context was used).
With the addition of batch limits into the server, we anticipate that people will hit this
kind of error way more often. To handle this properly, the client now waits for a single
response batch and expects it to contain all responses to the requests.
---------
Co-authored-by: Felix Lange <fjl@twurst.com>
Co-authored-by: Martin Holst Swende <martin@swende.se>
2023-06-13 14:38:58 +03:00
|
|
|
|
|
|
|
if ctx.IsSet(BatchRequestLimit.Name) {
|
|
|
|
cfg.BatchRequestLimit = ctx.Int(BatchRequestLimit.Name)
|
|
|
|
}
|
|
|
|
|
|
|
|
if ctx.IsSet(BatchResponseMaxSize.Name) {
|
|
|
|
cfg.BatchResponseMaxSize = ctx.Int(BatchResponseMaxSize.Name)
|
|
|
|
}
|
2016-02-05 13:45:36 +02:00
|
|
|
}
|
|
|
|
|
2019-01-21 17:38:13 +03:00
|
|
|
// setGraphQL creates the GraphQL listener interface string from the set
|
|
|
|
// command line flags, returning empty if the GraphQL endpoint is disabled.
|
|
|
|
func setGraphQL(ctx *cli.Context, cfg *node.Config) {
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(GraphQLCORSDomainFlag.Name) {
|
|
|
|
cfg.GraphQLCors = SplitAndTrim(ctx.String(GraphQLCORSDomainFlag.Name))
|
2019-01-21 17:38:13 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(GraphQLVirtualHostsFlag.Name) {
|
|
|
|
cfg.GraphQLVirtualHosts = SplitAndTrim(ctx.String(GraphQLVirtualHostsFlag.Name))
|
2019-01-21 17:38:13 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-04-12 17:27:23 +03:00
|
|
|
// setWS creates the WebSocket RPC listener interface string from the set
|
2016-02-05 15:08:48 +02:00
|
|
|
// command line flags, returning empty if the HTTP endpoint is disabled.
|
2017-04-12 17:27:23 +03:00
|
|
|
func setWS(ctx *cli.Context, cfg *node.Config) {
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.Bool(WSEnabledFlag.Name) && cfg.WSHost == "" {
|
2017-04-12 17:27:23 +03:00
|
|
|
cfg.WSHost = "127.0.0.1"
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(WSListenAddrFlag.Name) {
|
|
|
|
cfg.WSHost = ctx.String(WSListenAddrFlag.Name)
|
2017-04-12 17:27:23 +03:00
|
|
|
}
|
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(WSPortFlag.Name) {
|
|
|
|
cfg.WSPort = ctx.Int(WSPortFlag.Name)
|
2017-04-12 17:27:23 +03:00
|
|
|
}
|
2020-05-05 11:19:17 +03:00
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(WSAllowedOriginsFlag.Name) {
|
|
|
|
cfg.WSOrigins = SplitAndTrim(ctx.String(WSAllowedOriginsFlag.Name))
|
2017-04-12 17:27:23 +03:00
|
|
|
}
|
2020-05-05 11:19:17 +03:00
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(WSApiFlag.Name) {
|
|
|
|
cfg.WSModules = SplitAndTrim(ctx.String(WSApiFlag.Name))
|
2017-04-12 17:27:23 +03:00
|
|
|
}
|
2021-02-02 12:05:46 +03:00
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(WSPathPrefixFlag.Name) {
|
|
|
|
cfg.WSPathPrefix = ctx.String(WSPathPrefixFlag.Name)
|
2021-02-02 12:05:46 +03:00
|
|
|
}
|
2017-04-12 17:27:23 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// setIPC creates an IPC path configuration from the set command line flags,
|
|
|
|
// returning an empty string if IPC was explicitly disabled, or the set path.
|
|
|
|
func setIPC(ctx *cli.Context, cfg *node.Config) {
|
2019-07-08 15:59:07 +03:00
|
|
|
CheckExclusive(ctx, IPCDisabledFlag, IPCPathFlag)
|
2017-04-12 17:27:23 +03:00
|
|
|
switch {
|
2022-06-27 19:22:36 +03:00
|
|
|
case ctx.Bool(IPCDisabledFlag.Name):
|
2017-04-12 17:27:23 +03:00
|
|
|
cfg.IPCPath = ""
|
2022-06-27 19:22:36 +03:00
|
|
|
case ctx.IsSet(IPCPathFlag.Name):
|
|
|
|
cfg.IPCPath = ctx.String(IPCPathFlag.Name)
|
2016-02-05 15:08:48 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-07-10 05:08:59 +03:00
|
|
|
// setLes configures the les server and ultra light client settings from the command line flags.
|
2021-02-05 15:51:15 +03:00
|
|
|
func setLes(ctx *cli.Context, cfg *ethconfig.Config) {
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(LightServeFlag.Name) {
|
|
|
|
cfg.LightServ = ctx.Int(LightServeFlag.Name)
|
2019-07-10 08:54:06 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(LightIngressFlag.Name) {
|
|
|
|
cfg.LightIngress = ctx.Int(LightIngressFlag.Name)
|
2019-07-10 05:08:59 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(LightEgressFlag.Name) {
|
|
|
|
cfg.LightEgress = ctx.Int(LightEgressFlag.Name)
|
2019-07-10 05:08:59 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(LightMaxPeersFlag.Name) {
|
|
|
|
cfg.LightPeers = ctx.Int(LightMaxPeersFlag.Name)
|
2019-07-10 05:08:59 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(LightNoPruneFlag.Name) {
|
|
|
|
cfg.LightNoPrune = ctx.Bool(LightNoPruneFlag.Name)
|
2020-07-13 12:02:54 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(LightNoSyncServeFlag.Name) {
|
|
|
|
cfg.LightNoSyncServe = ctx.Bool(LightNoSyncServeFlag.Name)
|
2021-02-25 15:55:07 +03:00
|
|
|
}
|
2019-01-24 14:18:26 +03:00
|
|
|
}
|
|
|
|
|
2021-02-23 13:27:32 +03:00
|
|
|
// MakeDatabaseHandles raises out the number of allowed file handles per process
|
2016-02-19 14:29:19 +02:00
|
|
|
// for Geth and returns half of the allowance to assign to the database.
|
2022-03-07 11:21:06 +03:00
|
|
|
func MakeDatabaseHandles(max int) int {
|
2018-11-29 13:47:29 +03:00
|
|
|
limit, err := fdlimit.Maximum()
|
2016-02-19 14:29:19 +02:00
|
|
|
if err != nil {
|
2017-02-22 18:22:50 +03:00
|
|
|
Fatalf("Failed to retrieve file descriptor allowance: %v", err)
|
2016-02-19 14:29:19 +02:00
|
|
|
}
|
2022-03-07 11:21:06 +03:00
|
|
|
switch {
|
|
|
|
case max == 0:
|
|
|
|
// User didn't specify a meaningful value, use system limits
|
|
|
|
case max < 128:
|
|
|
|
// User specified something unhealthy, just use system defaults
|
|
|
|
log.Error("File descriptor limit invalid (<128)", "had", max, "updated", limit)
|
|
|
|
case max > limit:
|
|
|
|
// User requested more than the OS allows, notify that we can't allocate it
|
|
|
|
log.Warn("Requested file descriptors denied by OS", "req", max, "limit", limit)
|
|
|
|
default:
|
|
|
|
// User limit is meaningful and within allowed range, use that
|
|
|
|
limit = max
|
|
|
|
}
|
2019-02-12 13:29:05 +03:00
|
|
|
raised, err := fdlimit.Raise(uint64(limit))
|
|
|
|
if err != nil {
|
2018-11-29 13:47:29 +03:00
|
|
|
Fatalf("Failed to raise file descriptor allowance: %v", err)
|
2016-02-19 14:29:19 +02:00
|
|
|
}
|
2019-02-12 13:29:05 +03:00
|
|
|
return int(raised / 2) // Leave half for networking and other stuff
|
2016-02-19 14:29:19 +02:00
|
|
|
}
|
|
|
|
|
2015-11-17 18:33:25 +02:00
|
|
|
// MakeAddress converts an account specified directly as a hex encoded string or
|
|
|
|
// a key index in the key store to an internal account representation.
|
2017-01-24 12:49:20 +03:00
|
|
|
func MakeAddress(ks *keystore.KeyStore, account string) (accounts.Account, error) {
|
2015-11-17 18:33:25 +02:00
|
|
|
// If the specified account is a valid address, return it
|
|
|
|
if common.IsHexAddress(account) {
|
2016-03-03 02:09:16 +02:00
|
|
|
return accounts.Account{Address: common.HexToAddress(account)}, nil
|
2015-11-17 18:33:25 +02:00
|
|
|
}
|
|
|
|
// Otherwise try to interpret the account as a keystore index
|
|
|
|
index, err := strconv.Atoi(account)
|
2017-01-24 12:49:20 +03:00
|
|
|
if err != nil || index < 0 {
|
2016-03-03 02:09:16 +02:00
|
|
|
return accounts.Account{}, fmt.Errorf("invalid account address or index %q", account)
|
2015-11-17 18:33:25 +02:00
|
|
|
}
|
2017-12-10 01:42:23 +03:00
|
|
|
log.Warn("-------------------------------------------------------------------")
|
|
|
|
log.Warn("Referring to accounts by order in the keystore folder is dangerous!")
|
|
|
|
log.Warn("This functionality is deprecated and will be removed in the future!")
|
|
|
|
log.Warn("Please use explicit addresses! (can search via `geth account list`)")
|
|
|
|
log.Warn("-------------------------------------------------------------------")
|
|
|
|
|
2017-01-24 12:49:20 +03:00
|
|
|
accs := ks.Accounts()
|
|
|
|
if len(accs) <= index {
|
|
|
|
return accounts.Account{}, fmt.Errorf("index %d higher than number of accounts %d", index, len(accs))
|
|
|
|
}
|
|
|
|
return accs[index], nil
|
2015-11-17 18:33:25 +02:00
|
|
|
}
|
|
|
|
|
2023-01-20 19:26:01 +03:00
|
|
|
// setEtherbase retrieves the etherbase from the directly specified command line flags.
|
|
|
|
func setEtherbase(ctx *cli.Context, cfg *ethconfig.Config) {
|
2023-01-24 13:11:33 +03:00
|
|
|
if !ctx.IsSet(MinerEtherbaseFlag.Name) {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
addr := ctx.String(MinerEtherbaseFlag.Name)
|
|
|
|
if strings.HasPrefix(addr, "0x") || strings.HasPrefix(addr, "0X") {
|
|
|
|
addr = addr[2:]
|
|
|
|
}
|
|
|
|
b, err := hex.DecodeString(addr)
|
|
|
|
if err != nil || len(b) != common.AddressLength {
|
|
|
|
Fatalf("-%s: invalid etherbase address %q", MinerEtherbaseFlag.Name, addr)
|
|
|
|
return
|
2015-07-07 13:53:36 +03:00
|
|
|
}
|
2023-01-24 13:11:33 +03:00
|
|
|
cfg.Miner.Etherbase = common.BytesToAddress(b)
|
2015-11-17 18:33:25 +02:00
|
|
|
}
|
|
|
|
|
2017-04-28 13:38:49 +03:00
|
|
|
// MakePasswordList reads password lines from the file specified by the global --password flag.
|
2015-11-17 18:33:25 +02:00
|
|
|
func MakePasswordList(ctx *cli.Context) []string {
|
2022-06-27 19:22:36 +03:00
|
|
|
path := ctx.Path(PasswordFileFlag.Name)
|
2016-03-31 00:20:06 +03:00
|
|
|
if path == "" {
|
|
|
|
return nil
|
|
|
|
}
|
2022-05-16 12:59:35 +03:00
|
|
|
text, err := os.ReadFile(path)
|
2016-03-31 00:20:06 +03:00
|
|
|
if err != nil {
|
2017-02-22 18:22:50 +03:00
|
|
|
Fatalf("Failed to read password file: %v", err)
|
2016-03-31 00:20:06 +03:00
|
|
|
}
|
|
|
|
lines := strings.Split(string(text), "\n")
|
|
|
|
// Sanitise DOS line endings.
|
|
|
|
for i := range lines {
|
|
|
|
lines[i] = strings.TrimRight(lines[i], "\r")
|
2015-11-17 18:33:25 +02:00
|
|
|
}
|
2016-03-31 00:20:06 +03:00
|
|
|
return lines
|
2015-11-17 18:33:25 +02:00
|
|
|
}
|
|
|
|
|
2017-04-12 17:27:23 +03:00
|
|
|
func SetP2PConfig(ctx *cli.Context, cfg *p2p.Config) {
|
|
|
|
setNodeKey(ctx, cfg)
|
|
|
|
setNAT(ctx, cfg)
|
|
|
|
setListenAddress(ctx, cfg)
|
|
|
|
setBootstrapNodes(ctx, cfg)
|
|
|
|
setBootstrapNodesV5(ctx, cfg)
|
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
lightClient := ctx.String(SyncModeFlag.Name) == "light"
|
|
|
|
lightServer := (ctx.Int(LightServeFlag.Name) != 0)
|
2018-02-05 16:41:53 +03:00
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
lightPeers := ctx.Int(LightMaxPeersFlag.Name)
|
|
|
|
if lightClient && !ctx.IsSet(LightMaxPeersFlag.Name) {
|
2019-09-03 11:43:35 +03:00
|
|
|
// dynamic default - for clients we use 1/10th of the default for servers
|
|
|
|
lightPeers /= 10
|
|
|
|
}
|
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(MaxPeersFlag.Name) {
|
|
|
|
cfg.MaxPeers = ctx.Int(MaxPeersFlag.Name)
|
|
|
|
if lightServer && !ctx.IsSet(LightMaxPeersFlag.Name) {
|
2018-03-09 12:55:03 +03:00
|
|
|
cfg.MaxPeers += lightPeers
|
|
|
|
}
|
2018-02-05 16:41:53 +03:00
|
|
|
} else {
|
|
|
|
if lightServer {
|
|
|
|
cfg.MaxPeers += lightPeers
|
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if lightClient && ctx.IsSet(LightMaxPeersFlag.Name) && cfg.MaxPeers < lightPeers {
|
2018-02-05 16:41:53 +03:00
|
|
|
cfg.MaxPeers = lightPeers
|
|
|
|
}
|
2017-04-12 17:27:23 +03:00
|
|
|
}
|
2018-02-05 16:41:53 +03:00
|
|
|
if !(lightClient || lightServer) {
|
|
|
|
lightPeers = 0
|
|
|
|
}
|
|
|
|
ethPeers := cfg.MaxPeers - lightPeers
|
|
|
|
if lightClient {
|
|
|
|
ethPeers = 0
|
|
|
|
}
|
|
|
|
log.Info("Maximum peer count", "ETH", ethPeers, "LES", lightPeers, "total", cfg.MaxPeers)
|
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(MaxPendingPeersFlag.Name) {
|
|
|
|
cfg.MaxPendingPeers = ctx.Int(MaxPendingPeersFlag.Name)
|
2017-04-12 17:27:23 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(NoDiscoverFlag.Name) || lightClient {
|
2017-04-12 17:27:23 +03:00
|
|
|
cfg.NoDiscovery = true
|
2016-09-05 14:08:41 +03:00
|
|
|
}
|
|
|
|
|
2023-07-11 22:21:32 +03:00
|
|
|
// Disallow --nodiscover when used in conjunction with light mode.
|
|
|
|
if (lightClient || lightServer) && ctx.Bool(NoDiscoverFlag.Name) {
|
|
|
|
Fatalf("Cannot use --" + NoDiscoverFlag.Name + " in light client or light server mode")
|
|
|
|
}
|
|
|
|
CheckExclusive(ctx, DiscoveryV4Flag, NoDiscoverFlag)
|
|
|
|
CheckExclusive(ctx, DiscoveryV5Flag, NoDiscoverFlag)
|
|
|
|
cfg.DiscoveryV4 = ctx.Bool(DiscoveryV4Flag.Name)
|
|
|
|
cfg.DiscoveryV5 = ctx.Bool(DiscoveryV5Flag.Name)
|
|
|
|
|
|
|
|
// If we're running a light client or server, force enable the v5 peer discovery.
|
|
|
|
if lightClient || lightServer {
|
2017-04-12 17:27:23 +03:00
|
|
|
cfg.DiscoveryV5 = true
|
2016-08-15 19:38:32 +03:00
|
|
|
}
|
2017-04-12 17:27:23 +03:00
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
if netrestrict := ctx.String(NetrestrictFlag.Name); netrestrict != "" {
|
2016-11-22 22:52:31 +03:00
|
|
|
list, err := netutil.ParseNetlist(netrestrict)
|
|
|
|
if err != nil {
|
2017-02-22 18:22:50 +03:00
|
|
|
Fatalf("Option %q: %v", NetrestrictFlag.Name, err)
|
2016-11-22 22:52:31 +03:00
|
|
|
}
|
2017-04-12 17:27:23 +03:00
|
|
|
cfg.NetRestrict = list
|
2016-11-22 22:52:31 +03:00
|
|
|
}
|
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.Bool(DeveloperFlag.Name) {
|
2017-04-12 17:27:23 +03:00
|
|
|
// --dev mode can't use p2p networking.
|
|
|
|
cfg.MaxPeers = 0
|
2021-04-16 22:29:22 +03:00
|
|
|
cfg.ListenAddr = ""
|
|
|
|
cfg.NoDial = true
|
2017-04-12 17:27:23 +03:00
|
|
|
cfg.NoDiscovery = true
|
|
|
|
cfg.DiscoveryV5 = false
|
2016-08-15 19:38:32 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-04-12 17:27:23 +03:00
|
|
|
// SetNodeConfig applies node-related command line flags to the config.
|
|
|
|
func SetNodeConfig(ctx *cli.Context, cfg *node.Config) {
|
|
|
|
SetP2PConfig(ctx, &cfg.P2P)
|
|
|
|
setIPC(ctx, cfg)
|
|
|
|
setHTTP(ctx, cfg)
|
2019-01-21 17:38:13 +03:00
|
|
|
setGraphQL(ctx, cfg)
|
2017-04-12 17:27:23 +03:00
|
|
|
setWS(ctx, cfg)
|
|
|
|
setNodeUserIdent(ctx, cfg)
|
2022-06-21 12:16:05 +03:00
|
|
|
SetDataDir(ctx, cfg)
|
2019-05-31 12:30:28 +03:00
|
|
|
setSmartCard(ctx, cfg)
|
2017-04-12 17:27:23 +03:00
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(JWTSecretFlag.Name) {
|
|
|
|
cfg.JWTSecret = ctx.String(JWTSecretFlag.Name)
|
2022-03-07 10:30:27 +03:00
|
|
|
}
|
|
|
|
|
2023-02-02 14:52:19 +03:00
|
|
|
if ctx.IsSet(EnablePersonal.Name) {
|
|
|
|
cfg.EnablePersonal = true
|
|
|
|
}
|
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(ExternalSignerFlag.Name) {
|
|
|
|
cfg.ExternalSigner = ctx.String(ExternalSignerFlag.Name)
|
accounts, eth, clique, signer: support for external signer API (#18079)
* accounts, eth, clique: implement external backend + move sighash calc to backend
* signer: implement account_Version on external API
* accounts/external: enable ipc, add copyright
* accounts, internal, signer: formatting
* node: go fmt
* flags: disallow --dev in combo with --externalsigner
* accounts: remove clique-specific signing method, replace with more generic
* accounts, consensus: formatting + fix error in tests
* signer/core: remove (test-) import cycle
* clique: remove unused import
* accounts: remove CliqueHash and avoid dependency on package crypto
* consensus/clique: unduplicate header encoding
2019-02-05 13:23:57 +03:00
|
|
|
}
|
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(KeyStoreDirFlag.Name) {
|
|
|
|
cfg.KeyStoreDir = ctx.String(KeyStoreDirFlag.Name)
|
2017-04-12 17:27:23 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(DeveloperFlag.Name) {
|
2021-05-27 11:13:35 +03:00
|
|
|
cfg.UseLightweightKDF = true
|
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(LightKDFFlag.Name) {
|
|
|
|
cfg.UseLightweightKDF = ctx.Bool(LightKDFFlag.Name)
|
2017-04-12 17:27:23 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(NoUSBFlag.Name) || cfg.NoUSB {
|
2021-01-05 13:18:22 +03:00
|
|
|
log.Warn("Option nousb is deprecated and USB is deactivated by default. Use --usb to enable")
|
2017-04-20 14:01:51 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(USBFlag.Name) {
|
|
|
|
cfg.USB = ctx.Bool(USBFlag.Name)
|
2021-01-13 13:14:36 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(InsecureUnlockAllowedFlag.Name) {
|
|
|
|
cfg.InsecureUnlockAllowed = ctx.Bool(InsecureUnlockAllowedFlag.Name)
|
2019-04-04 14:03:10 +03:00
|
|
|
}
|
2023-02-09 11:48:34 +03:00
|
|
|
if ctx.IsSet(DBEngineFlag.Name) {
|
|
|
|
dbEngine := ctx.String(DBEngineFlag.Name)
|
|
|
|
if dbEngine != "leveldb" && dbEngine != "pebble" {
|
|
|
|
Fatalf("Invalid choice for db.engine '%s', allowed 'leveldb' or 'pebble'", dbEngine)
|
|
|
|
}
|
|
|
|
log.Info(fmt.Sprintf("Using %s as db engine", dbEngine))
|
|
|
|
cfg.DBEngine = dbEngine
|
|
|
|
}
|
2017-04-12 17:27:23 +03:00
|
|
|
}
|
|
|
|
|
2019-05-31 12:30:28 +03:00
|
|
|
func setSmartCard(ctx *cli.Context, cfg *node.Config) {
|
|
|
|
// Skip enabling smartcards if no path is set
|
2022-06-27 19:22:36 +03:00
|
|
|
path := ctx.String(SmartCardDaemonPathFlag.Name)
|
2019-05-31 12:30:28 +03:00
|
|
|
if path == "" {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
// Sanity check that the smartcard path is valid
|
|
|
|
fi, err := os.Stat(path)
|
|
|
|
if err != nil {
|
2019-06-04 22:17:12 +03:00
|
|
|
log.Info("Smartcard socket not found, disabling", "err", err)
|
2019-05-31 12:30:28 +03:00
|
|
|
return
|
|
|
|
}
|
|
|
|
if fi.Mode()&os.ModeType != os.ModeSocket {
|
|
|
|
log.Error("Invalid smartcard daemon path", "path", path, "type", fi.Mode().String())
|
|
|
|
return
|
|
|
|
}
|
|
|
|
// Smartcard daemon path exists and is a socket, enable it
|
|
|
|
cfg.SmartCardDaemonPath = path
|
|
|
|
}
|
|
|
|
|
2022-06-21 12:16:05 +03:00
|
|
|
func SetDataDir(ctx *cli.Context, cfg *node.Config) {
|
2018-11-23 03:32:34 +03:00
|
|
|
switch {
|
2022-06-27 19:22:36 +03:00
|
|
|
case ctx.IsSet(DataDirFlag.Name):
|
|
|
|
cfg.DataDir = ctx.String(DataDirFlag.Name)
|
|
|
|
case ctx.Bool(DeveloperFlag.Name):
|
2018-11-23 03:32:34 +03:00
|
|
|
cfg.DataDir = "" // unless explicitly requested, use memory databases
|
2022-06-27 19:22:36 +03:00
|
|
|
case ctx.Bool(GoerliFlag.Name) && cfg.DataDir == node.DefaultDataDir():
|
2018-11-16 18:58:24 +03:00
|
|
|
cfg.DataDir = filepath.Join(node.DefaultDataDir(), "goerli")
|
2022-06-27 19:22:36 +03:00
|
|
|
case ctx.Bool(SepoliaFlag.Name) && cfg.DataDir == node.DefaultDataDir():
|
2021-11-08 14:06:01 +03:00
|
|
|
cfg.DataDir = filepath.Join(node.DefaultDataDir(), "sepolia")
|
2018-11-23 03:32:34 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-03 15:50:35 +03:00
|
|
|
func setGPO(ctx *cli.Context, cfg *gasprice.Config, light bool) {
|
|
|
|
// If we are running the light client, apply another group
|
|
|
|
// settings for gas oracle.
|
|
|
|
if light {
|
2021-06-28 17:16:32 +03:00
|
|
|
*cfg = ethconfig.LightClientGPO
|
2020-07-03 15:50:35 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(GpoBlocksFlag.Name) {
|
|
|
|
cfg.Blocks = ctx.Int(GpoBlocksFlag.Name)
|
2017-04-12 17:27:23 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(GpoPercentileFlag.Name) {
|
|
|
|
cfg.Percentile = ctx.Int(GpoPercentileFlag.Name)
|
2017-04-12 17:27:23 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(GpoMaxGasPriceFlag.Name) {
|
|
|
|
cfg.MaxPrice = big.NewInt(ctx.Int64(GpoMaxGasPriceFlag.Name))
|
2020-09-09 18:38:47 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(GpoIgnoreGasPriceFlag.Name) {
|
|
|
|
cfg.IgnorePrice = big.NewInt(ctx.Int64(GpoIgnoreGasPriceFlag.Name))
|
2021-05-11 12:25:51 +03:00
|
|
|
}
|
2017-04-12 17:27:23 +03:00
|
|
|
}
|
|
|
|
|
2023-06-16 15:29:40 +03:00
|
|
|
func setTxPool(ctx *cli.Context, cfg *legacypool.Config) {
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(TxPoolLocalsFlag.Name) {
|
|
|
|
locals := strings.Split(ctx.String(TxPoolLocalsFlag.Name), ",")
|
2018-08-21 20:30:06 +03:00
|
|
|
for _, account := range locals {
|
|
|
|
if trimmed := strings.TrimSpace(account); !common.IsHexAddress(trimmed) {
|
|
|
|
Fatalf("Invalid account in --txpool.locals: %s", trimmed)
|
|
|
|
} else {
|
|
|
|
cfg.Locals = append(cfg.Locals, common.HexToAddress(account))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(TxPoolNoLocalsFlag.Name) {
|
|
|
|
cfg.NoLocals = ctx.Bool(TxPoolNoLocalsFlag.Name)
|
2017-07-05 17:06:05 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(TxPoolJournalFlag.Name) {
|
|
|
|
cfg.Journal = ctx.String(TxPoolJournalFlag.Name)
|
2017-07-28 16:09:39 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(TxPoolRejournalFlag.Name) {
|
|
|
|
cfg.Rejournal = ctx.Duration(TxPoolRejournalFlag.Name)
|
2017-07-28 16:09:39 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(TxPoolPriceLimitFlag.Name) {
|
|
|
|
cfg.PriceLimit = ctx.Uint64(TxPoolPriceLimitFlag.Name)
|
2017-05-26 13:40:47 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(TxPoolPriceBumpFlag.Name) {
|
|
|
|
cfg.PriceBump = ctx.Uint64(TxPoolPriceBumpFlag.Name)
|
2017-05-26 13:40:47 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(TxPoolAccountSlotsFlag.Name) {
|
|
|
|
cfg.AccountSlots = ctx.Uint64(TxPoolAccountSlotsFlag.Name)
|
2017-05-26 13:40:47 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(TxPoolGlobalSlotsFlag.Name) {
|
|
|
|
cfg.GlobalSlots = ctx.Uint64(TxPoolGlobalSlotsFlag.Name)
|
2017-05-26 13:40:47 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(TxPoolAccountQueueFlag.Name) {
|
|
|
|
cfg.AccountQueue = ctx.Uint64(TxPoolAccountQueueFlag.Name)
|
2017-05-26 13:40:47 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(TxPoolGlobalQueueFlag.Name) {
|
|
|
|
cfg.GlobalQueue = ctx.Uint64(TxPoolGlobalQueueFlag.Name)
|
2017-05-26 13:40:47 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(TxPoolLifetimeFlag.Name) {
|
|
|
|
cfg.Lifetime = ctx.Duration(TxPoolLifetimeFlag.Name)
|
2017-05-26 13:40:47 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-23 10:08:51 +03:00
|
|
|
func setMiner(ctx *cli.Context, cfg *miner.Config) {
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(MinerExtraDataFlag.Name) {
|
|
|
|
cfg.ExtraData = []byte(ctx.String(MinerExtraDataFlag.Name))
|
2019-04-23 10:08:51 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(MinerGasLimitFlag.Name) {
|
|
|
|
cfg.GasCeil = ctx.Uint64(MinerGasLimitFlag.Name)
|
2019-04-23 10:08:51 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(MinerGasPriceFlag.Name) {
|
|
|
|
cfg.GasPrice = flags.GlobalBig(ctx, MinerGasPriceFlag.Name)
|
2019-04-23 10:08:51 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(MinerRecommitIntervalFlag.Name) {
|
|
|
|
cfg.Recommit = ctx.Duration(MinerRecommitIntervalFlag.Name)
|
2019-04-23 10:08:51 +03:00
|
|
|
}
|
2022-10-03 15:10:00 +03:00
|
|
|
if ctx.IsSet(MinerNewPayloadTimeout.Name) {
|
|
|
|
cfg.NewPayloadTimeout = ctx.Duration(MinerNewPayloadTimeout.Name)
|
|
|
|
}
|
2019-04-23 10:08:51 +03:00
|
|
|
}
|
|
|
|
|
2022-05-04 19:55:17 +03:00
|
|
|
func setRequiredBlocks(ctx *cli.Context, cfg *ethconfig.Config) {
|
2022-06-27 19:22:36 +03:00
|
|
|
requiredBlocks := ctx.String(EthRequiredBlocksFlag.Name)
|
2022-05-04 19:55:17 +03:00
|
|
|
if requiredBlocks == "" {
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(LegacyWhitelistFlag.Name) {
|
2022-05-04 19:55:17 +03:00
|
|
|
log.Warn("The flag --whitelist is deprecated and will be removed, please use --eth.requiredblocks")
|
2022-06-27 19:22:36 +03:00
|
|
|
requiredBlocks = ctx.String(LegacyWhitelistFlag.Name)
|
2022-03-15 14:20:03 +03:00
|
|
|
} else {
|
|
|
|
return
|
|
|
|
}
|
2018-12-10 15:47:01 +03:00
|
|
|
}
|
2022-05-04 19:55:17 +03:00
|
|
|
cfg.RequiredBlocks = make(map[uint64]common.Hash)
|
|
|
|
for _, entry := range strings.Split(requiredBlocks, ",") {
|
2018-12-10 15:47:01 +03:00
|
|
|
parts := strings.Split(entry, "=")
|
|
|
|
if len(parts) != 2 {
|
2022-05-04 19:55:17 +03:00
|
|
|
Fatalf("Invalid required block entry: %s", entry)
|
2018-11-02 23:26:45 +03:00
|
|
|
}
|
2018-12-10 15:47:01 +03:00
|
|
|
number, err := strconv.ParseUint(parts[0], 0, 64)
|
|
|
|
if err != nil {
|
2022-05-04 19:55:17 +03:00
|
|
|
Fatalf("Invalid required block number %s: %v", parts[0], err)
|
2018-12-10 15:47:01 +03:00
|
|
|
}
|
|
|
|
var hash common.Hash
|
|
|
|
if err = hash.UnmarshalText([]byte(parts[1])); err != nil {
|
2022-05-04 19:55:17 +03:00
|
|
|
Fatalf("Invalid required block hash %s: %v", parts[1], err)
|
2018-12-10 15:47:01 +03:00
|
|
|
}
|
2022-05-04 19:55:17 +03:00
|
|
|
cfg.RequiredBlocks[number] = hash
|
2018-11-02 23:26:45 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-07-08 15:59:07 +03:00
|
|
|
// CheckExclusive verifies that only a single instance of the provided flags was
|
2017-11-24 18:07:22 +03:00
|
|
|
// set by the user. Each flag might optionally be followed by a string type to
|
|
|
|
// specialize it further.
|
2019-07-08 15:59:07 +03:00
|
|
|
func CheckExclusive(ctx *cli.Context, args ...interface{}) {
|
2017-04-12 17:27:23 +03:00
|
|
|
set := make([]string, 0, 1)
|
2017-11-24 18:07:22 +03:00
|
|
|
for i := 0; i < len(args); i++ {
|
|
|
|
// Make sure the next argument is a flag and skip if not set
|
|
|
|
flag, ok := args[i].(cli.Flag)
|
|
|
|
if !ok {
|
|
|
|
panic(fmt.Sprintf("invalid argument, not cli.Flag type: %T", args[i]))
|
|
|
|
}
|
|
|
|
// Check if next arg extends current and expand its name if so
|
2022-06-27 19:22:36 +03:00
|
|
|
name := flag.Names()[0]
|
2017-11-24 18:07:22 +03:00
|
|
|
|
|
|
|
if i+1 < len(args) {
|
|
|
|
switch option := args[i+1].(type) {
|
|
|
|
case string:
|
2018-10-08 17:08:56 +03:00
|
|
|
// Extended flag check, make sure value set doesn't conflict with passed in option
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.String(flag.Names()[0]) == option {
|
2017-11-24 18:07:22 +03:00
|
|
|
name += "=" + option
|
2018-10-08 17:08:56 +03:00
|
|
|
set = append(set, "--"+name)
|
2017-11-24 18:07:22 +03:00
|
|
|
}
|
2018-10-08 17:08:56 +03:00
|
|
|
// shift arguments and continue
|
2017-11-24 18:07:22 +03:00
|
|
|
i++
|
2018-10-08 17:08:56 +03:00
|
|
|
continue
|
2017-11-24 18:07:22 +03:00
|
|
|
|
|
|
|
case cli.Flag:
|
|
|
|
default:
|
|
|
|
panic(fmt.Sprintf("invalid argument, not cli.Flag or string extension: %T", args[i+1]))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// Mark the flag if it's set
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(flag.Names()[0]) {
|
2017-11-24 18:07:22 +03:00
|
|
|
set = append(set, "--"+name)
|
2015-11-17 18:33:25 +02:00
|
|
|
}
|
|
|
|
}
|
2017-04-12 17:27:23 +03:00
|
|
|
if len(set) > 1 {
|
2017-11-24 18:07:22 +03:00
|
|
|
Fatalf("Flags %v can't be used at the same time", strings.Join(set, ", "))
|
2015-11-17 18:33:25 +02:00
|
|
|
}
|
2017-04-12 17:27:23 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
// SetEthConfig applies eth-related command line flags to the config.
|
2021-02-05 15:51:15 +03:00
|
|
|
func SetEthConfig(ctx *cli.Context, stack *node.Node, cfg *ethconfig.Config) {
|
2017-04-12 17:27:23 +03:00
|
|
|
// Avoid conflicting network flags
|
2023-06-02 14:03:21 +03:00
|
|
|
CheckExclusive(ctx, MainnetFlag, DeveloperFlag, GoerliFlag, SepoliaFlag)
|
2021-02-24 16:07:58 +03:00
|
|
|
CheckExclusive(ctx, LightServeFlag, SyncModeFlag, "light")
|
2019-07-10 08:54:06 +03:00
|
|
|
CheckExclusive(ctx, DeveloperFlag, ExternalSignerFlag) // Can't use both ephemeral unlocked and external signer
|
all: activate pbss as experimental feature (#26274)
* all: activate pbss
* core/rawdb: fix compilation error
* cma, core, eth, les, trie: address comments
* cmd, core, eth, trie: polish code
* core, cmd, eth: address comments
* cmd, core, eth, les, light, tests: address comment
* cmd/utils: shorten log message
* trie/triedb/pathdb: limit node buffer size to 1gb
* cmd/utils: fix opening non-existing db
* cmd/utils: rename flag name
* cmd, core: group chain history flags and fix tests
* core, eth, trie: fix memory leak in snapshot generation
* cmd, eth, internal: deprecate flags
* all: enable state tests for pathdb, fixes
* cmd, core: polish code
* trie/triedb/pathdb: limit the node buffer size to 256mb
---------
Co-authored-by: Martin Holst Swende <martin@swende.se>
Co-authored-by: Péter Szilágyi <peterke@gmail.com>
2023-08-10 22:21:36 +03:00
|
|
|
|
|
|
|
// Set configurations from CLI flags
|
2023-01-20 19:26:01 +03:00
|
|
|
setEtherbase(ctx, cfg)
|
2022-06-27 19:22:36 +03:00
|
|
|
setGPO(ctx, &cfg.GPO, ctx.String(SyncModeFlag.Name) == "light")
|
2017-05-26 13:40:47 +03:00
|
|
|
setTxPool(ctx, &cfg.TxPool)
|
2019-04-23 10:08:51 +03:00
|
|
|
setMiner(ctx, &cfg.Miner)
|
2022-05-04 19:55:17 +03:00
|
|
|
setRequiredBlocks(ctx, cfg)
|
2019-07-10 05:08:59 +03:00
|
|
|
setLes(ctx, cfg)
|
2017-04-12 17:27:23 +03:00
|
|
|
|
2021-04-06 17:23:35 +03:00
|
|
|
// Cap the cache allowance and tune the garbage collector
|
|
|
|
mem, err := gopsutil.VirtualMemory()
|
|
|
|
if err == nil {
|
|
|
|
if 32<<(^uintptr(0)>>63) == 32 && mem.Total > 2*1024*1024*1024 {
|
|
|
|
log.Warn("Lowering memory allowance on 32bit arch", "available", mem.Total/1024/1024, "addressable", 2*1024)
|
|
|
|
mem.Total = 2 * 1024 * 1024 * 1024
|
|
|
|
}
|
|
|
|
allowance := int(mem.Total / 1024 / 1024 / 3)
|
2022-06-27 19:22:36 +03:00
|
|
|
if cache := ctx.Int(CacheFlag.Name); cache > allowance {
|
2021-04-06 17:23:35 +03:00
|
|
|
log.Warn("Sanitizing cache to Go's GC limits", "provided", cache, "updated", allowance)
|
2022-06-27 19:22:36 +03:00
|
|
|
ctx.Set(CacheFlag.Name, strconv.Itoa(allowance))
|
2021-04-06 17:23:35 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
// Ensure Go's GC ignores the database cache for trigger percentage
|
2022-06-27 19:22:36 +03:00
|
|
|
cache := ctx.Int(CacheFlag.Name)
|
2021-04-06 17:23:35 +03:00
|
|
|
gogc := math.Max(20, math.Min(100, 100/(float64(cache)/1024)))
|
|
|
|
|
|
|
|
log.Debug("Sanitizing Go's GC trigger", "percent", int(gogc))
|
|
|
|
godebug.SetGCPercent(int(gogc))
|
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(SyncModeFlag.Name) {
|
|
|
|
cfg.SyncMode = *flags.GlobalTextMarshaler(ctx, SyncModeFlag.Name).(*downloader.SyncMode)
|
2017-04-12 17:27:23 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(NetworkIdFlag.Name) {
|
|
|
|
cfg.NetworkId = ctx.Uint64(NetworkIdFlag.Name)
|
2017-04-12 17:27:23 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(CacheFlag.Name) || ctx.IsSet(CacheDatabaseFlag.Name) {
|
|
|
|
cfg.DatabaseCache = ctx.Int(CacheFlag.Name) * ctx.Int(CacheDatabaseFlag.Name) / 100
|
2017-04-12 17:27:23 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
cfg.DatabaseHandles = MakeDatabaseHandles(ctx.Int(FDLimitFlag.Name))
|
|
|
|
if ctx.IsSet(AncientFlag.Name) {
|
|
|
|
cfg.DatabaseFreezer = ctx.String(AncientFlag.Name)
|
2019-03-08 16:56:20 +03:00
|
|
|
}
|
2017-04-12 17:27:23 +03:00
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
if gcmode := ctx.String(GCModeFlag.Name); gcmode != "full" && gcmode != "archive" {
|
2018-02-05 19:40:32 +03:00
|
|
|
Fatalf("--%s must be either 'full' or 'archive'", GCModeFlag.Name)
|
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(GCModeFlag.Name) {
|
|
|
|
cfg.NoPruning = ctx.String(GCModeFlag.Name) == "archive"
|
2019-10-15 11:19:20 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(CacheNoPrefetchFlag.Name) {
|
|
|
|
cfg.NoPrefetch = ctx.Bool(CacheNoPrefetchFlag.Name)
|
2019-10-15 11:19:20 +03:00
|
|
|
}
|
2020-11-18 12:51:33 +03:00
|
|
|
// Read the value from the flag no matter if it's set or not.
|
2022-06-27 19:22:36 +03:00
|
|
|
cfg.Preimages = ctx.Bool(CachePreimagesFlag.Name)
|
2020-11-18 12:51:33 +03:00
|
|
|
if cfg.NoPruning && !cfg.Preimages {
|
|
|
|
cfg.Preimages = true
|
|
|
|
log.Info("Enabling recording of key preimages since archive mode is used")
|
|
|
|
}
|
all: activate pbss as experimental feature (#26274)
* all: activate pbss
* core/rawdb: fix compilation error
* cma, core, eth, les, trie: address comments
* cmd, core, eth, trie: polish code
* core, cmd, eth: address comments
* cmd, core, eth, les, light, tests: address comment
* cmd/utils: shorten log message
* trie/triedb/pathdb: limit node buffer size to 1gb
* cmd/utils: fix opening non-existing db
* cmd/utils: rename flag name
* cmd, core: group chain history flags and fix tests
* core, eth, trie: fix memory leak in snapshot generation
* cmd, eth, internal: deprecate flags
* all: enable state tests for pathdb, fixes
* cmd, core: polish code
* trie/triedb/pathdb: limit the node buffer size to 256mb
---------
Co-authored-by: Martin Holst Swende <martin@swende.se>
Co-authored-by: Péter Szilágyi <peterke@gmail.com>
2023-08-10 22:21:36 +03:00
|
|
|
if ctx.IsSet(StateHistoryFlag.Name) {
|
|
|
|
cfg.StateHistory = ctx.Uint64(StateHistoryFlag.Name)
|
|
|
|
}
|
|
|
|
// Parse state scheme, abort the process if it's not compatible.
|
|
|
|
chaindb := tryMakeReadOnlyDatabase(ctx, stack)
|
|
|
|
scheme, err := ParseStateScheme(ctx, chaindb)
|
|
|
|
chaindb.Close()
|
|
|
|
if err != nil {
|
|
|
|
Fatalf("%v", err)
|
|
|
|
}
|
|
|
|
cfg.StateScheme = scheme
|
|
|
|
|
|
|
|
// Parse transaction history flag, if user is still using legacy config
|
|
|
|
// file with 'TxLookupLimit' configured, copy the value to 'TransactionHistory'.
|
|
|
|
if cfg.TransactionHistory == ethconfig.Defaults.TransactionHistory && cfg.TxLookupLimit != ethconfig.Defaults.TxLookupLimit {
|
|
|
|
log.Warn("The config option 'TxLookupLimit' is deprecated and will be removed, please use 'TransactionHistory'")
|
|
|
|
cfg.TransactionHistory = cfg.TxLookupLimit
|
|
|
|
}
|
|
|
|
if ctx.IsSet(TransactionHistoryFlag.Name) {
|
|
|
|
cfg.TransactionHistory = ctx.Uint64(TransactionHistoryFlag.Name)
|
|
|
|
} else if ctx.IsSet(TxLookupLimitFlag.Name) {
|
|
|
|
log.Warn("The flag --txlookuplimit is deprecated and will be removed, please use --history.transactions")
|
|
|
|
cfg.TransactionHistory = ctx.Uint64(TransactionHistoryFlag.Name)
|
|
|
|
}
|
|
|
|
if ctx.String(GCModeFlag.Name) == "archive" && cfg.TransactionHistory != 0 {
|
|
|
|
cfg.TransactionHistory = 0
|
|
|
|
log.Warn("Disabled transaction unindexing for archive node")
|
|
|
|
}
|
|
|
|
if ctx.IsSet(LightServeFlag.Name) && cfg.TransactionHistory != 0 {
|
|
|
|
log.Warn("LES server cannot serve old transaction status and cannot connect below les/4 protocol version if transaction lookup index is limited")
|
2020-05-11 18:58:43 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(CacheFlag.Name) || ctx.IsSet(CacheTrieFlag.Name) {
|
|
|
|
cfg.TrieCleanCache = ctx.Int(CacheFlag.Name) * ctx.Int(CacheTrieFlag.Name) / 100
|
2018-11-12 19:47:34 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(CacheFlag.Name) || ctx.IsSet(CacheGCFlag.Name) {
|
|
|
|
cfg.TrieDirtyCache = ctx.Int(CacheFlag.Name) * ctx.Int(CacheGCFlag.Name) / 100
|
2018-02-05 19:40:32 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(CacheFlag.Name) || ctx.IsSet(CacheSnapshotFlag.Name) {
|
|
|
|
cfg.SnapshotCache = ctx.Int(CacheFlag.Name) * ctx.Int(CacheSnapshotFlag.Name) / 100
|
2019-11-26 10:48:29 +03:00
|
|
|
}
|
2022-08-19 12:14:59 +03:00
|
|
|
if ctx.IsSet(CacheLogSizeFlag.Name) {
|
|
|
|
cfg.FilterLogCacheSize = ctx.Int(CacheLogSizeFlag.Name)
|
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if !ctx.Bool(SnapshotFlag.Name) {
|
2020-12-14 12:27:15 +03:00
|
|
|
// If snap-sync is requested, this flag is also required
|
|
|
|
if cfg.SyncMode == downloader.SnapSync {
|
|
|
|
log.Info("Snap sync requested, enabling --snapshot")
|
|
|
|
} else {
|
|
|
|
cfg.TrieCleanCache += cfg.SnapshotCache
|
|
|
|
cfg.SnapshotCache = 0 // Disabled
|
|
|
|
}
|
2020-01-19 22:57:56 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(DocRootFlag.Name) {
|
|
|
|
cfg.DocRoot = ctx.String(DocRootFlag.Name)
|
2017-04-12 17:27:23 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(VMEnableDebugFlag.Name) {
|
2017-04-12 17:27:23 +03:00
|
|
|
// TODO(fjl): force-enable this in --dev mode
|
2022-06-27 19:22:36 +03:00
|
|
|
cfg.EnablePreimageRecording = ctx.Bool(VMEnableDebugFlag.Name)
|
2017-04-12 17:27:23 +03:00
|
|
|
}
|
2015-11-17 18:33:25 +02:00
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(RPCGlobalGasCapFlag.Name) {
|
|
|
|
cfg.RPCGasCap = ctx.Uint64(RPCGlobalGasCapFlag.Name)
|
2020-07-01 20:54:21 +03:00
|
|
|
}
|
|
|
|
if cfg.RPCGasCap != 0 {
|
|
|
|
log.Info("Set global gas cap", "cap", cfg.RPCGasCap)
|
|
|
|
} else {
|
|
|
|
log.Info("Global gas cap disabled")
|
2019-04-08 14:49:52 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(RPCGlobalEVMTimeoutFlag.Name) {
|
|
|
|
cfg.RPCEVMTimeout = ctx.Duration(RPCGlobalEVMTimeoutFlag.Name)
|
2021-10-12 11:46:04 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(RPCGlobalTxFeeCapFlag.Name) {
|
|
|
|
cfg.RPCTxFeeCap = ctx.Float64(RPCGlobalTxFeeCapFlag.Name)
|
2020-06-17 10:46:31 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(NoDiscoverFlag.Name) {
|
2020-12-14 12:27:15 +03:00
|
|
|
cfg.EthDiscoveryURLs, cfg.SnapDiscoveryURLs = []string{}, []string{}
|
2022-06-27 19:22:36 +03:00
|
|
|
} else if ctx.IsSet(DNSDiscoveryFlag.Name) {
|
|
|
|
urls := ctx.String(DNSDiscoveryFlag.Name)
|
2020-02-13 16:38:30 +03:00
|
|
|
if urls == "" {
|
2020-12-14 12:27:15 +03:00
|
|
|
cfg.EthDiscoveryURLs = []string{}
|
2020-02-13 16:38:30 +03:00
|
|
|
} else {
|
2020-12-14 12:27:15 +03:00
|
|
|
cfg.EthDiscoveryURLs = SplitAndTrim(urls)
|
2020-02-13 16:38:30 +03:00
|
|
|
}
|
|
|
|
}
|
2017-05-04 12:36:20 +03:00
|
|
|
// Override any default configs for hard coded networks.
|
2015-11-17 18:33:25 +02:00
|
|
|
switch {
|
2022-06-27 19:22:36 +03:00
|
|
|
case ctx.Bool(MainnetFlag.Name):
|
|
|
|
if !ctx.IsSet(NetworkIdFlag.Name) {
|
2021-01-05 16:31:23 +03:00
|
|
|
cfg.NetworkId = 1
|
|
|
|
}
|
|
|
|
cfg.Genesis = core.DefaultGenesisBlock()
|
|
|
|
SetDNSDiscoveryDefaults(cfg, params.MainnetGenesisHash)
|
2022-06-27 19:22:36 +03:00
|
|
|
case ctx.Bool(SepoliaFlag.Name):
|
|
|
|
if !ctx.IsSet(NetworkIdFlag.Name) {
|
2021-11-08 14:06:01 +03:00
|
|
|
cfg.NetworkId = 11155111
|
|
|
|
}
|
|
|
|
cfg.Genesis = core.DefaultSepoliaGenesisBlock()
|
|
|
|
SetDNSDiscoveryDefaults(cfg, params.SepoliaGenesisHash)
|
2022-06-27 19:22:36 +03:00
|
|
|
case ctx.Bool(GoerliFlag.Name):
|
|
|
|
if !ctx.IsSet(NetworkIdFlag.Name) {
|
2018-11-16 18:58:24 +03:00
|
|
|
cfg.NetworkId = 5
|
|
|
|
}
|
|
|
|
cfg.Genesis = core.DefaultGoerliGenesisBlock()
|
2020-10-05 13:50:26 +03:00
|
|
|
SetDNSDiscoveryDefaults(cfg, params.GoerliGenesisHash)
|
2022-06-27 19:22:36 +03:00
|
|
|
case ctx.Bool(DeveloperFlag.Name):
|
|
|
|
if !ctx.IsSet(NetworkIdFlag.Name) {
|
2018-06-14 12:31:31 +03:00
|
|
|
cfg.NetworkId = 1337
|
|
|
|
}
|
2021-05-27 11:13:35 +03:00
|
|
|
cfg.SyncMode = downloader.FullSync
|
2017-10-24 13:40:42 +03:00
|
|
|
// Create new developer account or reuse existing one
|
|
|
|
var (
|
2020-07-23 06:47:34 +03:00
|
|
|
developer accounts.Account
|
|
|
|
passphrase string
|
|
|
|
err error
|
2017-10-24 13:40:42 +03:00
|
|
|
)
|
2020-07-23 06:47:34 +03:00
|
|
|
if list := MakePasswordList(ctx); len(list) > 0 {
|
|
|
|
// Just take the first value. Although the function returns a possible multiple values and
|
|
|
|
// some usages iterate through them as attempts, that doesn't make sense in this setting,
|
|
|
|
// when we're definitely concerned with only one account.
|
|
|
|
passphrase = list[0]
|
|
|
|
}
|
2023-01-26 12:07:20 +03:00
|
|
|
|
2023-01-20 19:26:01 +03:00
|
|
|
// Unlock the developer account by local keystore.
|
|
|
|
var ks *keystore.KeyStore
|
|
|
|
if keystores := stack.AccountManager().Backends(keystore.KeyStoreType); len(keystores) > 0 {
|
|
|
|
ks = keystores[0].(*keystore.KeyStore)
|
|
|
|
}
|
|
|
|
if ks == nil {
|
|
|
|
Fatalf("Keystore is not available")
|
|
|
|
}
|
2023-01-26 12:07:20 +03:00
|
|
|
|
|
|
|
// Figure out the dev account address.
|
2020-07-23 06:47:34 +03:00
|
|
|
// setEtherbase has been called above, configuring the miner address from command line flags.
|
|
|
|
if cfg.Miner.Etherbase != (common.Address{}) {
|
|
|
|
developer = accounts.Account{Address: cfg.Miner.Etherbase}
|
|
|
|
} else if accs := ks.Accounts(); len(accs) > 0 {
|
2017-10-24 13:40:42 +03:00
|
|
|
developer = ks.Accounts()[0]
|
|
|
|
} else {
|
2020-07-23 06:47:34 +03:00
|
|
|
developer, err = ks.NewAccount(passphrase)
|
2017-10-24 13:40:42 +03:00
|
|
|
if err != nil {
|
|
|
|
Fatalf("Failed to create developer account: %v", err)
|
|
|
|
}
|
|
|
|
}
|
2023-01-26 12:07:20 +03:00
|
|
|
// Make sure the address is configured as fee recipient, otherwise
|
|
|
|
// the miner will fail to start.
|
|
|
|
cfg.Miner.Etherbase = developer.Address
|
|
|
|
|
2020-07-23 06:47:34 +03:00
|
|
|
if err := ks.Unlock(developer, passphrase); err != nil {
|
2017-10-24 13:40:42 +03:00
|
|
|
Fatalf("Failed to unlock developer account: %v", err)
|
|
|
|
}
|
|
|
|
log.Info("Using developer account", "address", developer.Address)
|
|
|
|
|
2020-07-21 15:53:47 +03:00
|
|
|
// Create a new developer genesis block or reuse existing one
|
2023-07-06 11:42:34 +03:00
|
|
|
cfg.Genesis = core.DeveloperGenesisBlock(ctx.Uint64(DeveloperGasLimitFlag.Name), developer.Address)
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(DataDirFlag.Name) {
|
all: activate pbss as experimental feature (#26274)
* all: activate pbss
* core/rawdb: fix compilation error
* cma, core, eth, les, trie: address comments
* cmd, core, eth, trie: polish code
* core, cmd, eth: address comments
* cmd, core, eth, les, light, tests: address comment
* cmd/utils: shorten log message
* trie/triedb/pathdb: limit node buffer size to 1gb
* cmd/utils: fix opening non-existing db
* cmd/utils: rename flag name
* cmd, core: group chain history flags and fix tests
* core, eth, trie: fix memory leak in snapshot generation
* cmd, eth, internal: deprecate flags
* all: enable state tests for pathdb, fixes
* cmd, core: polish code
* trie/triedb/pathdb: limit the node buffer size to 256mb
---------
Co-authored-by: Martin Holst Swende <martin@swende.se>
Co-authored-by: Péter Szilágyi <peterke@gmail.com>
2023-08-10 22:21:36 +03:00
|
|
|
chaindb := tryMakeReadOnlyDatabase(ctx, stack)
|
2020-07-21 15:53:47 +03:00
|
|
|
if rawdb.ReadCanonicalHash(chaindb, 0) != (common.Hash{}) {
|
|
|
|
cfg.Genesis = nil // fallback to db content
|
|
|
|
}
|
|
|
|
chaindb.Close()
|
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if !ctx.IsSet(MinerGasPriceFlag.Name) {
|
2019-04-23 10:08:51 +03:00
|
|
|
cfg.Miner.GasPrice = big.NewInt(1)
|
2015-09-06 16:46:54 +03:00
|
|
|
}
|
2020-02-13 16:38:30 +03:00
|
|
|
default:
|
|
|
|
if cfg.NetworkId == 1 {
|
2020-10-05 13:50:26 +03:00
|
|
|
SetDNSDiscoveryDefaults(cfg, params.MainnetGenesisHash)
|
2020-02-13 16:38:30 +03:00
|
|
|
}
|
|
|
|
}
|
2023-05-10 14:54:14 +03:00
|
|
|
// Set any dangling config values
|
|
|
|
if ctx.String(CryptoKZGFlag.Name) != "gokzg" && ctx.String(CryptoKZGFlag.Name) != "ckzg" {
|
|
|
|
Fatalf("--%s flag must be 'gokzg' or 'ckzg'", CryptoKZGFlag.Name)
|
|
|
|
}
|
|
|
|
log.Info("Initializing the KZG library", "backend", ctx.String(CryptoKZGFlag.Name))
|
|
|
|
if err := kzg4844.UseCKZG(ctx.String(CryptoKZGFlag.Name) == "ckzg"); err != nil {
|
|
|
|
Fatalf("Failed to set KZG library implementation to %s: %v", ctx.String(CryptoKZGFlag.Name), err)
|
|
|
|
}
|
2020-02-13 16:38:30 +03:00
|
|
|
}
|
|
|
|
|
2020-10-05 13:50:26 +03:00
|
|
|
// SetDNSDiscoveryDefaults configures DNS discovery with the given URL if
|
2020-02-13 16:38:30 +03:00
|
|
|
// no URLs are set.
|
2021-02-05 15:51:15 +03:00
|
|
|
func SetDNSDiscoveryDefaults(cfg *ethconfig.Config, genesis common.Hash) {
|
2020-12-14 12:27:15 +03:00
|
|
|
if cfg.EthDiscoveryURLs != nil {
|
2020-05-22 14:46:34 +03:00
|
|
|
return // already set through flags/config
|
|
|
|
}
|
2020-05-25 20:50:36 +03:00
|
|
|
protocol := "all"
|
2020-05-22 14:46:34 +03:00
|
|
|
if cfg.SyncMode == downloader.LightSync {
|
|
|
|
protocol = "les"
|
|
|
|
}
|
|
|
|
if url := params.KnownDNSNetwork(genesis, protocol); url != "" {
|
2020-12-14 12:27:15 +03:00
|
|
|
cfg.EthDiscoveryURLs = []string{url}
|
2021-05-04 12:29:32 +03:00
|
|
|
cfg.SnapDiscoveryURLs = cfg.EthDiscoveryURLs
|
2015-09-06 16:46:54 +03:00
|
|
|
}
|
2017-04-12 17:27:23 +03:00
|
|
|
}
|
2015-12-16 05:26:23 +02:00
|
|
|
|
2017-04-12 17:27:23 +03:00
|
|
|
// RegisterEthService adds an Ethereum client to the stack.
|
2021-04-16 22:29:22 +03:00
|
|
|
// The second return value is the full node instance, which may be nil if the
|
|
|
|
// node is running as a light client.
|
2022-02-02 18:57:34 +03:00
|
|
|
func RegisterEthService(stack *node.Node, cfg *ethconfig.Config) (ethapi.Backend, *eth.Ethereum) {
|
2017-04-12 17:27:23 +03:00
|
|
|
if cfg.SyncMode == downloader.LightSync {
|
2020-08-03 20:40:46 +03:00
|
|
|
backend, err := les.New(stack, cfg)
|
|
|
|
if err != nil {
|
|
|
|
Fatalf("Failed to register the Ethereum service: %v", err)
|
|
|
|
}
|
2021-01-25 16:36:39 +03:00
|
|
|
stack.RegisterAPIs(tracers.APIs(backend.ApiBackend))
|
2021-04-16 22:29:22 +03:00
|
|
|
return backend.ApiBackend, nil
|
2020-11-25 11:24:50 +03:00
|
|
|
}
|
|
|
|
backend, err := eth.New(stack, cfg)
|
|
|
|
if err != nil {
|
|
|
|
Fatalf("Failed to register the Ethereum service: %v", err)
|
|
|
|
}
|
|
|
|
if cfg.LightServ > 0 {
|
|
|
|
_, err := les.NewLesServer(stack, backend, cfg)
|
2020-08-03 20:40:46 +03:00
|
|
|
if err != nil {
|
2020-11-25 11:24:50 +03:00
|
|
|
Fatalf("Failed to create the LES server: %v", err)
|
2020-08-03 20:40:46 +03:00
|
|
|
}
|
2015-11-17 18:33:25 +02:00
|
|
|
}
|
2021-01-25 16:36:39 +03:00
|
|
|
stack.RegisterAPIs(tracers.APIs(backend.APIBackend))
|
2021-04-16 22:29:22 +03:00
|
|
|
return backend.APIBackend, backend
|
2016-08-15 19:38:32 +03:00
|
|
|
}
|
|
|
|
|
2022-08-19 12:14:59 +03:00
|
|
|
// RegisterEthStatsService configures the Ethereum Stats daemon and adds it to the node.
|
2020-08-03 20:40:46 +03:00
|
|
|
func RegisterEthStatsService(stack *node.Node, backend ethapi.Backend, url string) {
|
|
|
|
if err := ethstats.New(stack, backend, backend.Engine(), url); err != nil {
|
2017-02-22 18:22:50 +03:00
|
|
|
Fatalf("Failed to register the Ethereum Stats service: %v", err)
|
2016-11-25 18:55:06 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-08-19 12:14:59 +03:00
|
|
|
// RegisterGraphQLService adds the GraphQL API to the node.
|
|
|
|
func RegisterGraphQLService(stack *node.Node, backend ethapi.Backend, filterSystem *filters.FilterSystem, cfg *node.Config) {
|
|
|
|
err := graphql.New(stack, backend, filterSystem, cfg.GraphQLCors, cfg.GraphQLVirtualHosts)
|
|
|
|
if err != nil {
|
2019-06-12 11:24:24 +03:00
|
|
|
Fatalf("Failed to register the GraphQL service: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-08-19 12:14:59 +03:00
|
|
|
// RegisterFilterAPI adds the eth log filtering RPC API to the node.
|
|
|
|
func RegisterFilterAPI(stack *node.Node, backend ethapi.Backend, ethcfg *ethconfig.Config) *filters.FilterSystem {
|
|
|
|
isLightClient := ethcfg.SyncMode == downloader.LightSync
|
|
|
|
filterSystem := filters.NewFilterSystem(backend, filters.Config{
|
|
|
|
LogCacheSize: ethcfg.FilterLogCacheSize,
|
|
|
|
})
|
|
|
|
stack.RegisterAPIs([]rpc.API{{
|
|
|
|
Namespace: "eth",
|
|
|
|
Service: filters.NewFilterAPI(filterSystem, isLightClient),
|
|
|
|
}})
|
|
|
|
return filterSystem
|
|
|
|
}
|
|
|
|
|
2022-12-08 16:40:43 +03:00
|
|
|
// RegisterFullSyncTester adds the full-sync tester service into node.
|
|
|
|
func RegisterFullSyncTester(stack *node.Node, eth *eth.Ethereum, path string) {
|
|
|
|
blob, err := os.ReadFile(path)
|
|
|
|
if err != nil {
|
|
|
|
Fatalf("Failed to read block file: %v", err)
|
|
|
|
}
|
|
|
|
rlpBlob, err := hexutil.Decode(string(bytes.TrimRight(blob, "\r\n")))
|
|
|
|
if err != nil {
|
|
|
|
Fatalf("Failed to decode block blob: %v", err)
|
|
|
|
}
|
|
|
|
var block types.Block
|
|
|
|
if err := rlp.DecodeBytes(rlpBlob, &block); err != nil {
|
|
|
|
Fatalf("Failed to decode block: %v", err)
|
|
|
|
}
|
all: activate pbss as experimental feature (#26274)
* all: activate pbss
* core/rawdb: fix compilation error
* cma, core, eth, les, trie: address comments
* cmd, core, eth, trie: polish code
* core, cmd, eth: address comments
* cmd, core, eth, les, light, tests: address comment
* cmd/utils: shorten log message
* trie/triedb/pathdb: limit node buffer size to 1gb
* cmd/utils: fix opening non-existing db
* cmd/utils: rename flag name
* cmd, core: group chain history flags and fix tests
* core, eth, trie: fix memory leak in snapshot generation
* cmd, eth, internal: deprecate flags
* all: enable state tests for pathdb, fixes
* cmd, core: polish code
* trie/triedb/pathdb: limit the node buffer size to 256mb
---------
Co-authored-by: Martin Holst Swende <martin@swende.se>
Co-authored-by: Péter Szilágyi <peterke@gmail.com>
2023-08-10 22:21:36 +03:00
|
|
|
catalyst.RegisterFullSyncTester(stack, eth, &block)
|
2022-12-08 16:40:43 +03:00
|
|
|
log.Info("Registered full-sync tester", "number", block.NumberU64(), "hash", block.Hash())
|
|
|
|
}
|
|
|
|
|
2018-07-02 15:51:02 +03:00
|
|
|
func SetupMetrics(ctx *cli.Context) {
|
|
|
|
if metrics.Enabled {
|
|
|
|
log.Info("Enabling metrics collection")
|
2020-07-03 20:12:22 +03:00
|
|
|
|
2018-07-02 15:51:02 +03:00
|
|
|
var (
|
2022-06-27 19:22:36 +03:00
|
|
|
enableExport = ctx.Bool(MetricsEnableInfluxDBFlag.Name)
|
|
|
|
enableExportV2 = ctx.Bool(MetricsEnableInfluxDBV2Flag.Name)
|
2021-08-17 19:40:14 +03:00
|
|
|
)
|
|
|
|
|
|
|
|
if enableExport || enableExportV2 {
|
|
|
|
CheckExclusive(ctx, MetricsEnableInfluxDBFlag, MetricsEnableInfluxDBV2Flag)
|
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
v1FlagIsSet := ctx.IsSet(MetricsInfluxDBUsernameFlag.Name) ||
|
|
|
|
ctx.IsSet(MetricsInfluxDBPasswordFlag.Name)
|
2021-08-17 19:40:14 +03:00
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
v2FlagIsSet := ctx.IsSet(MetricsInfluxDBTokenFlag.Name) ||
|
|
|
|
ctx.IsSet(MetricsInfluxDBOrganizationFlag.Name) ||
|
|
|
|
ctx.IsSet(MetricsInfluxDBBucketFlag.Name)
|
2021-08-17 19:40:14 +03:00
|
|
|
|
|
|
|
if enableExport && v2FlagIsSet {
|
|
|
|
Fatalf("Flags --influxdb.metrics.organization, --influxdb.metrics.token, --influxdb.metrics.bucket are only available for influxdb-v2")
|
|
|
|
} else if enableExportV2 && v1FlagIsSet {
|
|
|
|
Fatalf("Flags --influxdb.metrics.username, --influxdb.metrics.password are only available for influxdb-v1")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
var (
|
2022-06-27 19:22:36 +03:00
|
|
|
endpoint = ctx.String(MetricsInfluxDBEndpointFlag.Name)
|
|
|
|
database = ctx.String(MetricsInfluxDBDatabaseFlag.Name)
|
|
|
|
username = ctx.String(MetricsInfluxDBUsernameFlag.Name)
|
|
|
|
password = ctx.String(MetricsInfluxDBPasswordFlag.Name)
|
|
|
|
|
|
|
|
token = ctx.String(MetricsInfluxDBTokenFlag.Name)
|
|
|
|
bucket = ctx.String(MetricsInfluxDBBucketFlag.Name)
|
|
|
|
organization = ctx.String(MetricsInfluxDBOrganizationFlag.Name)
|
2018-07-02 15:51:02 +03:00
|
|
|
)
|
|
|
|
|
|
|
|
if enableExport {
|
2022-06-27 19:22:36 +03:00
|
|
|
tagsMap := SplitTagsFlag(ctx.String(MetricsInfluxDBTagsFlag.Name))
|
2019-01-29 11:14:24 +03:00
|
|
|
|
2018-07-02 15:51:02 +03:00
|
|
|
log.Info("Enabling metrics export to InfluxDB")
|
2019-01-29 11:14:24 +03:00
|
|
|
|
|
|
|
go influxdb.InfluxDBWithTags(metrics.DefaultRegistry, 10*time.Second, endpoint, database, username, password, "geth.", tagsMap)
|
2021-08-17 19:40:14 +03:00
|
|
|
} else if enableExportV2 {
|
2022-06-27 19:22:36 +03:00
|
|
|
tagsMap := SplitTagsFlag(ctx.String(MetricsInfluxDBTagsFlag.Name))
|
2021-08-17 19:40:14 +03:00
|
|
|
|
|
|
|
log.Info("Enabling metrics export to InfluxDB (v2)")
|
|
|
|
|
|
|
|
go influxdb.InfluxDBV2WithTags(metrics.DefaultRegistry, 10*time.Second, endpoint, token, bucket, organization, "geth.", tagsMap)
|
2019-01-29 11:14:24 +03:00
|
|
|
}
|
2020-07-03 20:12:22 +03:00
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(MetricsHTTPFlag.Name) {
|
2023-07-02 14:21:16 +03:00
|
|
|
address := net.JoinHostPort(ctx.String(MetricsHTTPFlag.Name), fmt.Sprintf("%d", ctx.Int(MetricsPortFlag.Name)))
|
2020-07-03 20:12:22 +03:00
|
|
|
log.Info("Enabling stand-alone metrics HTTP endpoint", "address", address)
|
|
|
|
exp.Setup(address)
|
2022-11-24 13:37:58 +03:00
|
|
|
} else if ctx.IsSet(MetricsPortFlag.Name) {
|
|
|
|
log.Warn(fmt.Sprintf("--%s specified without --%s, metrics server will not start.", MetricsPortFlag.Name, MetricsHTTPFlag.Name))
|
2020-07-03 20:12:22 +03:00
|
|
|
}
|
2019-01-29 11:14:24 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func SplitTagsFlag(tagsFlag string) map[string]string {
|
|
|
|
tags := strings.Split(tagsFlag, ",")
|
|
|
|
tagsMap := map[string]string{}
|
|
|
|
|
|
|
|
for _, t := range tags {
|
|
|
|
if t != "" {
|
|
|
|
kv := strings.Split(t, "=")
|
|
|
|
|
|
|
|
if len(kv) == 2 {
|
|
|
|
tagsMap[kv[0]] = kv[1]
|
|
|
|
}
|
2018-07-02 15:51:02 +03:00
|
|
|
}
|
|
|
|
}
|
2019-01-29 11:14:24 +03:00
|
|
|
|
|
|
|
return tagsMap
|
2018-07-02 15:51:02 +03:00
|
|
|
}
|
|
|
|
|
2016-03-02 00:32:43 +02:00
|
|
|
// MakeChainDatabase open an LevelDB using the flags passed to the client and will hard crash if it fails.
|
2021-03-22 21:06:30 +03:00
|
|
|
func MakeChainDatabase(ctx *cli.Context, stack *node.Node, readonly bool) ethdb.Database {
|
2016-03-02 00:32:43 +02:00
|
|
|
var (
|
2022-06-27 19:22:36 +03:00
|
|
|
cache = ctx.Int(CacheFlag.Name) * ctx.Int(CacheDatabaseFlag.Name) / 100
|
|
|
|
handles = MakeDatabaseHandles(ctx.Int(FDLimitFlag.Name))
|
2020-07-13 12:02:54 +03:00
|
|
|
|
|
|
|
err error
|
|
|
|
chainDb ethdb.Database
|
2016-03-02 00:32:43 +02:00
|
|
|
)
|
2022-05-18 17:27:17 +03:00
|
|
|
switch {
|
2022-06-27 19:22:36 +03:00
|
|
|
case ctx.IsSet(RemoteDBFlag.Name):
|
2022-09-30 14:50:25 +03:00
|
|
|
log.Info("Using remote db", "url", ctx.String(RemoteDBFlag.Name), "headers", len(ctx.StringSlice(HttpHeaderFlag.Name)))
|
|
|
|
client, err := DialRPCWithHeaders(ctx.String(RemoteDBFlag.Name), ctx.StringSlice(HttpHeaderFlag.Name))
|
|
|
|
if err != nil {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
chainDb = remotedb.New(client)
|
2022-06-27 19:22:36 +03:00
|
|
|
case ctx.String(SyncModeFlag.Name) == "light":
|
2022-05-18 17:27:17 +03:00
|
|
|
chainDb, err = stack.OpenDatabase("lightchaindata", cache, handles, "", readonly)
|
|
|
|
default:
|
2022-06-27 19:22:36 +03:00
|
|
|
chainDb, err = stack.OpenDatabaseWithFreezer("chaindata", cache, handles, ctx.String(AncientFlag.Name), "", readonly)
|
2017-05-03 13:35:47 +03:00
|
|
|
}
|
2016-03-02 00:32:43 +02:00
|
|
|
if err != nil {
|
2017-02-22 18:22:50 +03:00
|
|
|
Fatalf("Could not open database: %v", err)
|
2015-04-13 11:13:52 +03:00
|
|
|
}
|
2016-03-02 00:32:43 +02:00
|
|
|
return chainDb
|
|
|
|
}
|
|
|
|
|
all: activate pbss as experimental feature (#26274)
* all: activate pbss
* core/rawdb: fix compilation error
* cma, core, eth, les, trie: address comments
* cmd, core, eth, trie: polish code
* core, cmd, eth: address comments
* cmd, core, eth, les, light, tests: address comment
* cmd/utils: shorten log message
* trie/triedb/pathdb: limit node buffer size to 1gb
* cmd/utils: fix opening non-existing db
* cmd/utils: rename flag name
* cmd, core: group chain history flags and fix tests
* core, eth, trie: fix memory leak in snapshot generation
* cmd, eth, internal: deprecate flags
* all: enable state tests for pathdb, fixes
* cmd, core: polish code
* trie/triedb/pathdb: limit the node buffer size to 256mb
---------
Co-authored-by: Martin Holst Swende <martin@swende.se>
Co-authored-by: Péter Szilágyi <peterke@gmail.com>
2023-08-10 22:21:36 +03:00
|
|
|
// tryMakeReadOnlyDatabase try to open the chain database in read-only mode,
|
|
|
|
// or fallback to write mode if the database is not initialized.
|
|
|
|
func tryMakeReadOnlyDatabase(ctx *cli.Context, stack *node.Node) ethdb.Database {
|
|
|
|
// If datadir doesn't exist we need to open db in write-mode
|
|
|
|
// so database engine can create files.
|
|
|
|
readonly := true
|
|
|
|
if !common.FileExist(stack.ResolvePath("chaindata")) {
|
|
|
|
readonly = false
|
|
|
|
}
|
|
|
|
return MakeChainDatabase(ctx, stack, readonly)
|
|
|
|
}
|
|
|
|
|
2022-09-26 14:55:18 +03:00
|
|
|
func IsNetworkPreset(ctx *cli.Context) bool {
|
|
|
|
for _, flag := range NetworkFlags {
|
|
|
|
bFlag, _ := flag.(*cli.BoolFlag)
|
|
|
|
if ctx.IsSet(bFlag.Name) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2022-09-30 14:50:25 +03:00
|
|
|
func DialRPCWithHeaders(endpoint string, headers []string) (*rpc.Client, error) {
|
|
|
|
if endpoint == "" {
|
|
|
|
return nil, errors.New("endpoint must be specified")
|
|
|
|
}
|
|
|
|
if strings.HasPrefix(endpoint, "rpc:") || strings.HasPrefix(endpoint, "ipc:") {
|
|
|
|
// Backwards compatibility with geth < 1.5 which required
|
|
|
|
// these prefixes.
|
|
|
|
endpoint = endpoint[4:]
|
|
|
|
}
|
|
|
|
var opts []rpc.ClientOption
|
|
|
|
if len(headers) > 0 {
|
|
|
|
var customHeaders = make(http.Header)
|
|
|
|
for _, h := range headers {
|
|
|
|
kv := strings.Split(h, ":")
|
|
|
|
if len(kv) != 2 {
|
|
|
|
return nil, fmt.Errorf("invalid http header directive: %q", h)
|
|
|
|
}
|
|
|
|
customHeaders.Add(kv[0], kv[1])
|
|
|
|
}
|
|
|
|
opts = append(opts, rpc.WithHeaders(customHeaders))
|
|
|
|
}
|
|
|
|
return rpc.DialOptions(context.Background(), endpoint, opts...)
|
|
|
|
}
|
|
|
|
|
2017-03-02 16:03:33 +03:00
|
|
|
func MakeGenesis(ctx *cli.Context) *core.Genesis {
|
|
|
|
var genesis *core.Genesis
|
|
|
|
switch {
|
2022-06-27 19:22:36 +03:00
|
|
|
case ctx.Bool(MainnetFlag.Name):
|
2021-03-09 12:50:25 +03:00
|
|
|
genesis = core.DefaultGenesisBlock()
|
2022-06-27 19:22:36 +03:00
|
|
|
case ctx.Bool(SepoliaFlag.Name):
|
2021-11-08 14:06:01 +03:00
|
|
|
genesis = core.DefaultSepoliaGenesisBlock()
|
2022-06-27 19:22:36 +03:00
|
|
|
case ctx.Bool(GoerliFlag.Name):
|
2018-11-16 18:58:24 +03:00
|
|
|
genesis = core.DefaultGoerliGenesisBlock()
|
2022-06-27 19:22:36 +03:00
|
|
|
case ctx.Bool(DeveloperFlag.Name):
|
2017-10-24 13:40:42 +03:00
|
|
|
Fatalf("Developer chains are ephemeral")
|
2017-03-02 16:03:33 +03:00
|
|
|
}
|
|
|
|
return genesis
|
|
|
|
}
|
|
|
|
|
2016-03-02 00:32:43 +02:00
|
|
|
// MakeChain creates a chain manager from set command line flags.
|
2022-10-19 09:20:39 +03:00
|
|
|
func MakeChain(ctx *cli.Context, stack *node.Node, readonly bool) (*core.BlockChain, ethdb.Database) {
|
2022-08-30 19:22:28 +03:00
|
|
|
var (
|
|
|
|
gspec = MakeGenesis(ctx)
|
2022-10-19 09:20:39 +03:00
|
|
|
chainDb = MakeChainDatabase(ctx, stack, readonly)
|
2022-08-30 19:22:28 +03:00
|
|
|
)
|
2023-05-03 12:58:39 +03:00
|
|
|
config, err := core.LoadChainConfig(chainDb, gspec)
|
2017-03-02 16:03:33 +03:00
|
|
|
if err != nil {
|
|
|
|
Fatalf("%v", err)
|
|
|
|
}
|
2023-05-03 12:58:39 +03:00
|
|
|
engine, err := ethconfig.CreateConsensusEngine(config, chainDb)
|
|
|
|
if err != nil {
|
|
|
|
Fatalf("%v", err)
|
2017-10-10 15:51:09 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if gcmode := ctx.String(GCModeFlag.Name); gcmode != "full" && gcmode != "archive" {
|
2018-02-05 19:40:32 +03:00
|
|
|
Fatalf("--%s must be either 'full' or 'archive'", GCModeFlag.Name)
|
|
|
|
}
|
all: activate pbss as experimental feature (#26274)
* all: activate pbss
* core/rawdb: fix compilation error
* cma, core, eth, les, trie: address comments
* cmd, core, eth, trie: polish code
* core, cmd, eth: address comments
* cmd, core, eth, les, light, tests: address comment
* cmd/utils: shorten log message
* trie/triedb/pathdb: limit node buffer size to 1gb
* cmd/utils: fix opening non-existing db
* cmd/utils: rename flag name
* cmd, core: group chain history flags and fix tests
* core, eth, trie: fix memory leak in snapshot generation
* cmd, eth, internal: deprecate flags
* all: enable state tests for pathdb, fixes
* cmd, core: polish code
* trie/triedb/pathdb: limit the node buffer size to 256mb
---------
Co-authored-by: Martin Holst Swende <martin@swende.se>
Co-authored-by: Péter Szilágyi <peterke@gmail.com>
2023-08-10 22:21:36 +03:00
|
|
|
scheme, err := ParseStateScheme(ctx, chainDb)
|
|
|
|
if err != nil {
|
|
|
|
Fatalf("%v", err)
|
|
|
|
}
|
2018-02-05 19:40:32 +03:00
|
|
|
cache := &core.CacheConfig{
|
2021-02-05 15:51:15 +03:00
|
|
|
TrieCleanLimit: ethconfig.Defaults.TrieCleanCache,
|
2022-06-27 19:22:36 +03:00
|
|
|
TrieCleanNoPrefetch: ctx.Bool(CacheNoPrefetchFlag.Name),
|
2021-02-05 15:51:15 +03:00
|
|
|
TrieDirtyLimit: ethconfig.Defaults.TrieDirtyCache,
|
2022-06-27 19:22:36 +03:00
|
|
|
TrieDirtyDisabled: ctx.String(GCModeFlag.Name) == "archive",
|
2021-02-05 15:51:15 +03:00
|
|
|
TrieTimeLimit: ethconfig.Defaults.TrieTimeout,
|
|
|
|
SnapshotLimit: ethconfig.Defaults.SnapshotCache,
|
2022-06-27 19:22:36 +03:00
|
|
|
Preimages: ctx.Bool(CachePreimagesFlag.Name),
|
all: activate pbss as experimental feature (#26274)
* all: activate pbss
* core/rawdb: fix compilation error
* cma, core, eth, les, trie: address comments
* cmd, core, eth, trie: polish code
* core, cmd, eth: address comments
* cmd, core, eth, les, light, tests: address comment
* cmd/utils: shorten log message
* trie/triedb/pathdb: limit node buffer size to 1gb
* cmd/utils: fix opening non-existing db
* cmd/utils: rename flag name
* cmd, core: group chain history flags and fix tests
* core, eth, trie: fix memory leak in snapshot generation
* cmd, eth, internal: deprecate flags
* all: enable state tests for pathdb, fixes
* cmd, core: polish code
* trie/triedb/pathdb: limit the node buffer size to 256mb
---------
Co-authored-by: Martin Holst Swende <martin@swende.se>
Co-authored-by: Péter Szilágyi <peterke@gmail.com>
2023-08-10 22:21:36 +03:00
|
|
|
StateScheme: scheme,
|
|
|
|
StateHistory: ctx.Uint64(StateHistoryFlag.Name),
|
2020-11-18 12:51:33 +03:00
|
|
|
}
|
|
|
|
if cache.TrieDirtyDisabled && !cache.Preimages {
|
|
|
|
cache.Preimages = true
|
|
|
|
log.Info("Enabling recording of key preimages since archive mode is used")
|
2018-11-12 19:47:34 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if !ctx.Bool(SnapshotFlag.Name) {
|
2020-01-19 22:57:56 +03:00
|
|
|
cache.SnapshotLimit = 0 // Disabled
|
|
|
|
}
|
2022-10-19 09:20:39 +03:00
|
|
|
// If we're in readonly, do not bother generating snapshot data.
|
|
|
|
if readonly {
|
|
|
|
cache.SnapshotNoBuild = true
|
|
|
|
}
|
2022-09-23 21:20:36 +03:00
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(CacheFlag.Name) || ctx.IsSet(CacheTrieFlag.Name) {
|
|
|
|
cache.TrieCleanLimit = ctx.Int(CacheFlag.Name) * ctx.Int(CacheTrieFlag.Name) / 100
|
2018-02-05 19:40:32 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.IsSet(CacheFlag.Name) || ctx.IsSet(CacheGCFlag.Name) {
|
|
|
|
cache.TrieDirtyLimit = ctx.Int(CacheFlag.Name) * ctx.Int(CacheGCFlag.Name) / 100
|
2018-02-05 19:40:32 +03:00
|
|
|
}
|
2022-06-27 19:22:36 +03:00
|
|
|
vmcfg := vm.Config{EnablePreimageRecording: ctx.Bool(VMEnableDebugFlag.Name)}
|
2021-03-22 21:06:30 +03:00
|
|
|
|
|
|
|
// Disable transaction indexing/unindexing by default.
|
2022-08-30 19:22:28 +03:00
|
|
|
chain, err := core.NewBlockChain(chainDb, cache, gspec, nil, engine, vmcfg, nil, nil)
|
2015-06-08 13:12:13 +03:00
|
|
|
if err != nil {
|
2017-03-02 16:03:33 +03:00
|
|
|
Fatalf("Can't create BlockChain: %v", err)
|
2015-06-08 13:12:13 +03:00
|
|
|
}
|
2015-08-06 20:57:39 +03:00
|
|
|
return chain, chainDb
|
2015-03-06 04:00:41 +02:00
|
|
|
}
|
2016-05-06 12:40:23 +03:00
|
|
|
|
|
|
|
// MakeConsolePreloads retrieves the absolute paths for the console JavaScript
|
|
|
|
// scripts to preload before starting.
|
|
|
|
func MakeConsolePreloads(ctx *cli.Context) []string {
|
|
|
|
// Skip preloading if there's nothing to preload
|
2022-06-27 19:22:36 +03:00
|
|
|
if ctx.String(PreloadJSFlag.Name) == "" {
|
2016-05-06 12:40:23 +03:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
// Otherwise resolve absolute paths and return them
|
2019-02-15 02:02:11 +03:00
|
|
|
var preloads []string
|
2016-05-06 12:40:23 +03:00
|
|
|
|
2022-06-27 19:22:36 +03:00
|
|
|
for _, file := range strings.Split(ctx.String(PreloadJSFlag.Name), ",") {
|
2021-01-12 17:50:11 +03:00
|
|
|
preloads = append(preloads, strings.TrimSpace(file))
|
2016-05-06 12:40:23 +03:00
|
|
|
}
|
|
|
|
return preloads
|
|
|
|
}
|
all: activate pbss as experimental feature (#26274)
* all: activate pbss
* core/rawdb: fix compilation error
* cma, core, eth, les, trie: address comments
* cmd, core, eth, trie: polish code
* core, cmd, eth: address comments
* cmd, core, eth, les, light, tests: address comment
* cmd/utils: shorten log message
* trie/triedb/pathdb: limit node buffer size to 1gb
* cmd/utils: fix opening non-existing db
* cmd/utils: rename flag name
* cmd, core: group chain history flags and fix tests
* core, eth, trie: fix memory leak in snapshot generation
* cmd, eth, internal: deprecate flags
* all: enable state tests for pathdb, fixes
* cmd, core: polish code
* trie/triedb/pathdb: limit the node buffer size to 256mb
---------
Co-authored-by: Martin Holst Swende <martin@swende.se>
Co-authored-by: Péter Szilágyi <peterke@gmail.com>
2023-08-10 22:21:36 +03:00
|
|
|
|
|
|
|
// ParseStateScheme resolves scheme identifier from CLI flag. If the provided
|
|
|
|
// state scheme is not compatible with the one of persistent scheme, an error
|
|
|
|
// will be returned.
|
|
|
|
//
|
|
|
|
// - none: use the scheme consistent with persistent state, or fallback
|
|
|
|
// to hash-based scheme if state is empty.
|
|
|
|
// - hash: use hash-based scheme or error out if not compatible with
|
|
|
|
// persistent state scheme.
|
|
|
|
// - path: use path-based scheme or error out if not compatible with
|
|
|
|
// persistent state scheme.
|
|
|
|
func ParseStateScheme(ctx *cli.Context, disk ethdb.Database) (string, error) {
|
|
|
|
// If state scheme is not specified, use the scheme consistent
|
|
|
|
// with persistent state, or fallback to hash mode if database
|
|
|
|
// is empty.
|
|
|
|
stored := rawdb.ReadStateScheme(disk)
|
|
|
|
if !ctx.IsSet(StateSchemeFlag.Name) {
|
|
|
|
if stored == "" {
|
|
|
|
// use default scheme for empty database, flip it when
|
|
|
|
// path mode is chosen as default
|
|
|
|
log.Info("State schema set to default", "scheme", "hash")
|
|
|
|
return rawdb.HashScheme, nil
|
|
|
|
}
|
|
|
|
log.Info("State scheme set to already existing", "scheme", stored)
|
|
|
|
return stored, nil // reuse scheme of persistent scheme
|
|
|
|
}
|
|
|
|
// If state scheme is specified, ensure it's compatible with
|
|
|
|
// persistent state.
|
|
|
|
scheme := ctx.String(StateSchemeFlag.Name)
|
|
|
|
if stored == "" || scheme == stored {
|
|
|
|
log.Info("State scheme set by user", "scheme", scheme)
|
|
|
|
return scheme, nil
|
|
|
|
}
|
|
|
|
return "", fmt.Errorf("incompatible state scheme, stored: %s, provided: %s", stored, scheme)
|
|
|
|
}
|
|
|
|
|
|
|
|
// MakeTrieDatabase constructs a trie database based on the configured scheme.
|
|
|
|
func MakeTrieDatabase(ctx *cli.Context, disk ethdb.Database, preimage bool, readOnly bool) *trie.Database {
|
|
|
|
config := &trie.Config{
|
|
|
|
Preimages: preimage,
|
|
|
|
}
|
|
|
|
scheme, err := ParseStateScheme(ctx, disk)
|
|
|
|
if err != nil {
|
|
|
|
Fatalf("%v", err)
|
|
|
|
}
|
|
|
|
if scheme == rawdb.HashScheme {
|
|
|
|
// Read-only mode is not implemented in hash mode,
|
|
|
|
// ignore the parameter silently. TODO(rjl493456442)
|
|
|
|
// please config it if read mode is implemented.
|
|
|
|
config.HashDB = hashdb.Defaults
|
|
|
|
return trie.NewDatabase(disk, config)
|
|
|
|
}
|
|
|
|
if readOnly {
|
|
|
|
config.PathDB = pathdb.ReadOnly
|
|
|
|
} else {
|
|
|
|
config.PathDB = pathdb.Defaults
|
|
|
|
}
|
|
|
|
return trie.NewDatabase(disk, config)
|
|
|
|
}
|