use clap::{App, Arg}; pub fn cli_app<'a, 'b>() -> App<'a, 'b> { App::new("beacon_node") .visible_aliases(&["b", "bn", "beacon"]) .version(crate_version!()) .author("Sigma Prime ") .setting(clap::AppSettings::ColoredHelp) .about("The primary component which connects to the Ethereum 2.0 P2P network and \ downloads, verifies and stores blocks. Provides a HTTP API for querying \ the beacon chain and publishing messages to the network.") /* * Configuration directory locations. */ .arg( Arg::with_name("network-dir") .long("network-dir") .value_name("DIR") .help("Data directory for network keys. Defaults to network/ inside the beacon node \ dir.") .takes_value(true) ) .arg( Arg::with_name("freezer-dir") .long("freezer-dir") .value_name("DIR") .help("Data directory for the freezer database.") .takes_value(true) ) /* * Network parameters. */ .arg( Arg::with_name("zero-ports") .long("zero-ports") .short("z") .help("Sets all listening TCP/UDP ports to 0, allowing the OS to choose some \ arbitrary free ports.") .takes_value(false), ) .arg( Arg::with_name("listen-address") .long("listen-address") .value_name("ADDRESS") .help("The address lighthouse will listen for UDP and TCP connections.") .default_value("0.0.0.0") .takes_value(true) ) .arg( Arg::with_name("port") .long("port") .value_name("PORT") .help("The TCP/UDP port to listen on. The UDP port can be modified by the --discovery-port flag.") .default_value("9000") .takes_value(true), ) .arg( Arg::with_name("discovery-port") .long("discovery-port") .value_name("PORT") .help("The UDP port that discovery will listen on. Defaults to `port`") .takes_value(true), ) .arg( Arg::with_name("target-peers") .long("target-peers") .help("The target number of peers.") .default_value("50") .takes_value(true), ) .arg( Arg::with_name("boot-nodes") .long("boot-nodes") .allow_hyphen_values(true) .value_name("ENR/MULTIADDR LIST") .help("One or more comma-delimited base64-encoded ENR's to bootstrap the p2p network. Multiaddr is also supported.") .takes_value(true), ) .arg( Arg::with_name("disable-upnp") .long("disable-upnp") .help("Disables UPnP support. Setting this will prevent Lighthouse from attempting to automatically establish external port mappings.") .takes_value(false), ) .arg( Arg::with_name("enr-udp-port") .long("enr-udp-port") .value_name("PORT") .help("The UDP port of the local ENR. Set this only if you are sure other nodes can connect to your local node on this port.") .takes_value(true), ) .arg( Arg::with_name("enr-tcp-port") .long("enr-tcp-port") .value_name("PORT") .help("The TCP port of the local ENR. Set this only if you are sure other nodes can connect to your local node on this port.\ The --port flag is used if this is not set.") .takes_value(true), ) .arg( Arg::with_name("enr-address") .long("enr-address") .value_name("ADDRESS") .help("The IP address/ DNS address to broadcast to other peers on how to reach this node. \ If a DNS address is provided, the enr-address is set to the IP address it resolves to and \ does not auto-update based on PONG responses in discovery. \ Set this only if you are sure other nodes can connect to your local node on this address. \ Discovery will automatically find your external address,if possible.") .requires("enr-udp-port") .takes_value(true), ) .arg( Arg::with_name("enr-match") .short("e") .long("enr-match") .help("Sets the local ENR IP address and port to match those set for lighthouse. \ Specifically, the IP address will be the value of --listen-address and the UDP port will be --discovery-port.") ) .arg( Arg::with_name("disable-enr-auto-update") .short("x") .long("disable-enr-auto-update") .help("Discovery automatically updates the nodes local ENR with an external IP address and port as seen by other peers on the network. \ This disables this feature, fixing the ENR's IP/PORT to those specified on boot.") .takes_value(true), ) .arg( Arg::with_name("libp2p-addresses") .long("libp2p-addresses") .value_name("MULTIADDR") .help("One or more comma-delimited multiaddrs to manually connect to a libp2p peer \ without an ENR.") .takes_value(true), ) .arg( Arg::with_name("disable-discovery") .long("disable-discovery") .help("Disables the discv5 discovery protocol. The node will not search for new peers or participate in the discovery protocol.") .takes_value(false), ) .arg( Arg::with_name("trusted-peers") .long("trusted-peers") .value_name("TRUSTED_PEERS") .help("One or more comma-delimited trusted peer ids which always have the highest score according to the peer scoring system.") .takes_value(true), ) /* REST API related arguments */ .arg( Arg::with_name("http") .long("http") .help("Enable the RESTful HTTP API server. Disabled by default.") .takes_value(false), ) .arg( Arg::with_name("http-address") .long("http-address") .value_name("ADDRESS") .help("Set the listen address for the RESTful HTTP API server.") .default_value("127.0.0.1") .takes_value(true), ) .arg( Arg::with_name("http-port") .long("http-port") .value_name("PORT") .help("Set the listen TCP port for the RESTful HTTP API server.") .default_value("5052") .takes_value(true), ) .arg( Arg::with_name("http-allow-origin") .long("http-allow-origin") .value_name("ORIGIN") .help("Set the value of the Access-Control-Allow-Origin response HTTP header. \ Use * to allow any origin (not recommended in production). \ If no value is supplied, the CORS allowed origin is set to the listen \ address of this server (e.g., http://localhost:5052).") .takes_value(true), ) /* Prometheus metrics HTTP server related arguments */ .arg( Arg::with_name("metrics") .long("metrics") .help("Enable the Prometheus metrics HTTP server. Disabled by default.") .takes_value(false), ) .arg( Arg::with_name("metrics-address") .long("metrics-address") .value_name("ADDRESS") .help("Set the listen address for the Prometheus metrics HTTP server.") .default_value("127.0.0.1") .takes_value(true), ) .arg( Arg::with_name("metrics-port") .long("metrics-port") .value_name("PORT") .help("Set the listen TCP port for the Prometheus metrics HTTP server.") .default_value("5054") .takes_value(true), ) .arg( Arg::with_name("metrics-allow-origin") .long("metrics-allow-origin") .value_name("ORIGIN") .help("Set the value of the Access-Control-Allow-Origin response HTTP header. \ Use * to allow any origin (not recommended in production). \ If no value is supplied, the CORS allowed origin is set to the listen \ address of this server (e.g., http://localhost:5054).") .takes_value(true), ) /* Websocket related arguments */ .arg( Arg::with_name("ws") .long("ws") .help("Enable the websocket server. Disabled by default.") .takes_value(false), ) .arg( Arg::with_name("ws-address") .long("ws-address") .value_name("ADDRESS") .help("Set the listen address for the websocket server.") .default_value("127.0.0.1") .takes_value(true), ) .arg( Arg::with_name("ws-port") .long("ws-port") .value_name("PORT") .help("Set the listen TCP port for the websocket server.") .default_value("5053") .takes_value(true), ) /* * Standard staking flags */ .arg( Arg::with_name("staking") .long("staking") .help("Standard option for a staking beacon node. Equivalent to \ `lighthouse bn --http --eth1 `. This will enable the http server on localhost:5052 \ and try connecting to an eth1 node on localhost:8545") .takes_value(false) ) /* * Eth1 Integration */ .arg( Arg::with_name("eth1") .long("eth1") .help("If present the node will connect to an eth1 node. This is required for \ block production, you must use this flag if you wish to serve a validator.") .takes_value(false), ) .arg( Arg::with_name("dummy-eth1") .long("dummy-eth1") .conflicts_with("eth1") .help("If present, uses an eth1 backend that generates static dummy data.\ Identical to the method used at the 2019 Canada interop.") ) .arg( Arg::with_name("eth1-endpoint") .long("eth1-endpoint") .value_name("HTTP-ENDPOINT") .help("Specifies the server for a web3 connection to the Eth1 chain. Also enables the --eth1 flag. Defaults to http://127.0.0.1:8545.") .takes_value(true) ) .arg( Arg::with_name("slots-per-restore-point") .long("slots-per-restore-point") .value_name("SLOT_COUNT") .help("Specifies how often a freezer DB restore point should be stored. \ Cannot be changed after initialization. \ [default: 2048 (mainnet) or 64 (minimal)]") .takes_value(true) ) .arg( Arg::with_name("block-cache-size") .long("block-cache-size") .value_name("SIZE") .help("Specifies how many blocks the database should cache in memory [default: 5]") .takes_value(true) ) /* * Purge. */ .arg( Arg::with_name("purge-db") .long("purge-db") .help("If present, the chain database will be deleted. Use with caution.") ) /* * Misc. */ .arg( Arg::with_name("graffiti") .long("graffiti") .help( "Specify your custom graffiti to be included in blocks. \ Defaults to the current version and commit, truncated to fit in 32 bytes. " ) .value_name("GRAFFITI") .takes_value(true) ) .arg( Arg::with_name("max-skip-slots") .long("max-skip-slots") .help( "Refuse to skip more than this many slots when processing a block or attestation. \ This prevents nodes on minority forks from wasting our time and disk space, \ but could also cause unnecessary consensus failures, so is disabled by default." ) .value_name("NUM_SLOTS") .takes_value(true) ) .arg( Arg::with_name("wss-checkpoint") .long("wss-checkpoint") .help( "Used to input a Weak Subjectivity State Checkpoint in `block_root:epoch_number` format,\ where block_root is an '0x' prefixed 32-byte hex string and epoch_number is an integer." ) .value_name("WSS_CHECKPOINT") .takes_value(true) ) }