2017-04-14 08:29:00 +00:00
|
|
|
// Copyright 2017 The go-ethereum Authors
|
2017-04-12 14:27:23 +00:00
|
|
|
// This file is part of go-ethereum.
|
|
|
|
//
|
|
|
|
// go-ethereum is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// go-ethereum is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU General Public License
|
|
|
|
// along with go-ethereum. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bufio"
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"os"
|
|
|
|
"reflect"
|
|
|
|
"unicode"
|
|
|
|
|
2022-06-27 16:22:36 +00:00
|
|
|
"github.com/urfave/cli/v2"
|
2017-04-12 14:27:23 +00:00
|
|
|
|
2021-08-25 20:34:22 +00:00
|
|
|
"github.com/ethereum/go-ethereum/accounts/external"
|
|
|
|
"github.com/ethereum/go-ethereum/accounts/keystore"
|
|
|
|
"github.com/ethereum/go-ethereum/accounts/scwallet"
|
|
|
|
"github.com/ethereum/go-ethereum/accounts/usbwallet"
|
2017-04-12 14:27:23 +00:00
|
|
|
"github.com/ethereum/go-ethereum/cmd/utils"
|
2022-12-08 13:40:43 +00:00
|
|
|
"github.com/ethereum/go-ethereum/eth/downloader"
|
2021-02-05 12:51:15 +00:00
|
|
|
"github.com/ethereum/go-ethereum/eth/ethconfig"
|
2020-08-03 17:40:46 +00:00
|
|
|
"github.com/ethereum/go-ethereum/internal/ethapi"
|
2022-06-27 16:22:36 +00:00
|
|
|
"github.com/ethereum/go-ethereum/internal/flags"
|
2022-09-23 12:08:25 +00:00
|
|
|
"github.com/ethereum/go-ethereum/internal/version"
|
2021-06-30 10:57:32 +00:00
|
|
|
"github.com/ethereum/go-ethereum/log"
|
2021-01-18 13:36:05 +00:00
|
|
|
"github.com/ethereum/go-ethereum/metrics"
|
2017-04-12 14:27:23 +00:00
|
|
|
"github.com/ethereum/go-ethereum/node"
|
|
|
|
"github.com/ethereum/go-ethereum/params"
|
|
|
|
"github.com/naoina/toml"
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
2022-06-27 16:22:36 +00:00
|
|
|
dumpConfigCommand = &cli.Command{
|
|
|
|
Action: dumpConfig,
|
2017-04-12 14:27:23 +00:00
|
|
|
Name: "dumpconfig",
|
|
|
|
Usage: "Show configuration values",
|
|
|
|
ArgsUsage: "",
|
2022-07-25 09:07:44 +00:00
|
|
|
Flags: flags.Merge(nodeFlags, rpcFlags),
|
2017-04-12 14:27:23 +00:00
|
|
|
Description: `The dumpconfig command shows configuration values.`,
|
|
|
|
}
|
|
|
|
|
2022-06-27 16:22:36 +00:00
|
|
|
configFileFlag = &cli.StringFlag{
|
|
|
|
Name: "config",
|
|
|
|
Usage: "TOML configuration file",
|
|
|
|
Category: flags.EthCategory,
|
2017-04-12 14:27:23 +00:00
|
|
|
}
|
|
|
|
)
|
|
|
|
|
|
|
|
// These settings ensure that TOML keys use the same names as Go struct fields.
|
|
|
|
var tomlSettings = toml.Config{
|
|
|
|
NormFieldName: func(rt reflect.Type, key string) string {
|
|
|
|
return key
|
|
|
|
},
|
|
|
|
FieldToKey: func(rt reflect.Type, field string) string {
|
|
|
|
return field
|
|
|
|
},
|
|
|
|
MissingField: func(rt reflect.Type, field string) error {
|
2021-06-30 10:57:32 +00:00
|
|
|
id := fmt.Sprintf("%s.%s", rt.String(), field)
|
|
|
|
if deprecated(id) {
|
|
|
|
log.Warn("Config field is deprecated and won't have an effect", "name", id)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
var link string
|
2017-04-12 14:27:23 +00:00
|
|
|
if unicode.IsUpper(rune(rt.Name()[0])) && rt.PkgPath() != "main" {
|
|
|
|
link = fmt.Sprintf(", see https://godoc.org/%s#%s for available fields", rt.PkgPath(), rt.Name())
|
|
|
|
}
|
|
|
|
return fmt.Errorf("field '%s' is not defined in %s%s", field, rt.String(), link)
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
type ethstatsConfig struct {
|
|
|
|
URL string `toml:",omitempty"`
|
|
|
|
}
|
|
|
|
|
|
|
|
type gethConfig struct {
|
2021-02-05 12:51:15 +00:00
|
|
|
Eth ethconfig.Config
|
2019-11-14 09:04:16 +00:00
|
|
|
Node node.Config
|
|
|
|
Ethstats ethstatsConfig
|
2021-01-18 13:36:05 +00:00
|
|
|
Metrics metrics.Config
|
2017-04-12 14:27:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func loadConfig(file string, cfg *gethConfig) error {
|
|
|
|
f, err := os.Open(file)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer f.Close()
|
|
|
|
|
|
|
|
err = tomlSettings.NewDecoder(bufio.NewReader(f)).Decode(cfg)
|
|
|
|
// Add file name to errors that have a line number.
|
|
|
|
if _, ok := err.(*toml.LineError); ok {
|
|
|
|
err = errors.New(file + ", " + err.Error())
|
|
|
|
}
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
func defaultNodeConfig() node.Config {
|
2022-09-23 12:08:25 +00:00
|
|
|
git, _ := version.VCS()
|
2017-04-12 14:27:23 +00:00
|
|
|
cfg := node.DefaultConfig
|
|
|
|
cfg.Name = clientIdentifier
|
2022-09-23 12:08:25 +00:00
|
|
|
cfg.Version = params.VersionWithCommit(git.Commit, git.Date)
|
2020-01-28 09:37:08 +00:00
|
|
|
cfg.HTTPModules = append(cfg.HTTPModules, "eth")
|
|
|
|
cfg.WSModules = append(cfg.WSModules, "eth")
|
2017-04-12 14:27:23 +00:00
|
|
|
cfg.IPCPath = "geth.ipc"
|
|
|
|
return cfg
|
|
|
|
}
|
|
|
|
|
2020-08-06 07:24:36 +00:00
|
|
|
// makeConfigNode loads geth configuration and creates a blank node instance.
|
2017-04-12 14:27:23 +00:00
|
|
|
func makeConfigNode(ctx *cli.Context) (*node.Node, gethConfig) {
|
|
|
|
// Load defaults.
|
|
|
|
cfg := gethConfig{
|
2021-02-05 12:51:15 +00:00
|
|
|
Eth: ethconfig.Defaults,
|
2021-01-18 13:36:05 +00:00
|
|
|
Node: defaultNodeConfig(),
|
|
|
|
Metrics: metrics.DefaultConfig,
|
2017-04-12 14:27:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Load config file.
|
2022-06-27 16:22:36 +00:00
|
|
|
if file := ctx.String(configFileFlag.Name); file != "" {
|
2017-04-12 14:27:23 +00:00
|
|
|
if err := loadConfig(file, &cfg); err != nil {
|
|
|
|
utils.Fatalf("%v", err)
|
|
|
|
}
|
|
|
|
}
|
2021-03-03 14:08:14 +00:00
|
|
|
|
2017-04-12 14:27:23 +00:00
|
|
|
// Apply flags.
|
|
|
|
utils.SetNodeConfig(ctx, &cfg.Node)
|
|
|
|
stack, err := node.New(&cfg.Node)
|
|
|
|
if err != nil {
|
|
|
|
utils.Fatalf("Failed to create the protocol stack: %v", err)
|
|
|
|
}
|
2021-08-25 20:34:22 +00:00
|
|
|
// Node doesn't by default populate account manager backends
|
|
|
|
if err := setAccountManagerBackends(stack); err != nil {
|
|
|
|
utils.Fatalf("Failed to set account manager backends: %v", err)
|
|
|
|
}
|
|
|
|
|
2017-04-12 14:27:23 +00:00
|
|
|
utils.SetEthConfig(ctx, stack, &cfg.Eth)
|
2022-06-27 16:22:36 +00:00
|
|
|
if ctx.IsSet(utils.EthStatsURLFlag.Name) {
|
|
|
|
cfg.Ethstats.URL = ctx.String(utils.EthStatsURLFlag.Name)
|
2017-04-12 14:27:23 +00:00
|
|
|
}
|
2021-01-18 13:36:05 +00:00
|
|
|
applyMetricConfig(ctx, &cfg)
|
|
|
|
|
2017-04-12 14:27:23 +00:00
|
|
|
return stack, cfg
|
|
|
|
}
|
|
|
|
|
2020-08-06 07:24:36 +00:00
|
|
|
// makeFullNode loads geth configuration and creates the Ethereum backend.
|
2020-08-03 17:40:46 +00:00
|
|
|
func makeFullNode(ctx *cli.Context) (*node.Node, ethapi.Backend) {
|
2017-04-12 14:27:23 +00:00
|
|
|
stack, cfg := makeConfigNode(ctx)
|
2022-06-27 16:22:36 +00:00
|
|
|
if ctx.IsSet(utils.OverrideTerminalTotalDifficulty.Name) {
|
|
|
|
cfg.Eth.OverrideTerminalTotalDifficulty = flags.GlobalBig(ctx, utils.OverrideTerminalTotalDifficulty.Name)
|
2021-04-16 19:29:22 +00:00
|
|
|
}
|
2022-08-01 12:13:25 +00:00
|
|
|
if ctx.IsSet(utils.OverrideTerminalTotalDifficultyPassed.Name) {
|
|
|
|
override := ctx.Bool(utils.OverrideTerminalTotalDifficultyPassed.Name)
|
|
|
|
cfg.Eth.OverrideTerminalTotalDifficultyPassed = &override
|
|
|
|
}
|
2022-08-19 09:14:59 +00:00
|
|
|
|
2022-12-08 13:40:43 +00:00
|
|
|
backend, eth := utils.RegisterEthService(stack, &cfg.Eth)
|
2022-08-19 09:14:59 +00:00
|
|
|
|
|
|
|
// Configure log filter RPC API.
|
|
|
|
filterSystem := utils.RegisterFilterAPI(stack, backend, &cfg.Eth)
|
|
|
|
|
|
|
|
// Configure GraphQL if requested.
|
2022-06-27 16:22:36 +00:00
|
|
|
if ctx.IsSet(utils.GraphQLEnabledFlag.Name) {
|
2022-08-19 09:14:59 +00:00
|
|
|
utils.RegisterGraphQLService(stack, backend, filterSystem, &cfg.Node)
|
2019-01-21 14:38:13 +00:00
|
|
|
}
|
2022-08-19 09:14:59 +00:00
|
|
|
|
2017-04-12 14:27:23 +00:00
|
|
|
// Add the Ethereum Stats daemon if requested.
|
|
|
|
if cfg.Ethstats.URL != "" {
|
2020-08-03 17:40:46 +00:00
|
|
|
utils.RegisterEthStatsService(stack, backend, cfg.Ethstats.URL)
|
2017-04-12 14:27:23 +00:00
|
|
|
}
|
2022-12-08 13:40:43 +00:00
|
|
|
|
|
|
|
// Configure full-sync tester service if requested
|
|
|
|
if ctx.IsSet(utils.SyncTargetFlag.Name) && cfg.Eth.SyncMode == downloader.FullSync {
|
|
|
|
utils.RegisterFullSyncTester(stack, eth, ctx.Path(utils.SyncTargetFlag.Name))
|
|
|
|
}
|
2020-08-03 17:40:46 +00:00
|
|
|
return stack, backend
|
2017-04-12 14:27:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// dumpConfig is the dumpconfig command.
|
|
|
|
func dumpConfig(ctx *cli.Context) error {
|
|
|
|
_, cfg := makeConfigNode(ctx)
|
|
|
|
comment := ""
|
|
|
|
|
|
|
|
if cfg.Eth.Genesis != nil {
|
|
|
|
cfg.Eth.Genesis = nil
|
|
|
|
comment += "# Note: this config doesn't contain the genesis block.\n\n"
|
|
|
|
}
|
|
|
|
|
|
|
|
out, err := tomlSettings.Marshal(&cfg)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-01-07 08:56:50 +00:00
|
|
|
|
|
|
|
dump := os.Stdout
|
|
|
|
if ctx.NArg() > 0 {
|
|
|
|
dump, err = os.OpenFile(ctx.Args().Get(0), os.O_RDWR|os.O_CREATE|os.O_TRUNC, 0644)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer dump.Close()
|
|
|
|
}
|
|
|
|
dump.WriteString(comment)
|
|
|
|
dump.Write(out)
|
|
|
|
|
2017-04-12 14:27:23 +00:00
|
|
|
return nil
|
|
|
|
}
|
2021-01-18 13:36:05 +00:00
|
|
|
|
|
|
|
func applyMetricConfig(ctx *cli.Context, cfg *gethConfig) {
|
2022-06-27 16:22:36 +00:00
|
|
|
if ctx.IsSet(utils.MetricsEnabledFlag.Name) {
|
|
|
|
cfg.Metrics.Enabled = ctx.Bool(utils.MetricsEnabledFlag.Name)
|
2021-01-18 13:36:05 +00:00
|
|
|
}
|
2022-06-27 16:22:36 +00:00
|
|
|
if ctx.IsSet(utils.MetricsEnabledExpensiveFlag.Name) {
|
|
|
|
cfg.Metrics.EnabledExpensive = ctx.Bool(utils.MetricsEnabledExpensiveFlag.Name)
|
2021-01-18 13:36:05 +00:00
|
|
|
}
|
2022-06-27 16:22:36 +00:00
|
|
|
if ctx.IsSet(utils.MetricsHTTPFlag.Name) {
|
|
|
|
cfg.Metrics.HTTP = ctx.String(utils.MetricsHTTPFlag.Name)
|
2021-01-18 13:36:05 +00:00
|
|
|
}
|
2022-06-27 16:22:36 +00:00
|
|
|
if ctx.IsSet(utils.MetricsPortFlag.Name) {
|
|
|
|
cfg.Metrics.Port = ctx.Int(utils.MetricsPortFlag.Name)
|
2021-01-18 13:36:05 +00:00
|
|
|
}
|
2022-06-27 16:22:36 +00:00
|
|
|
if ctx.IsSet(utils.MetricsEnableInfluxDBFlag.Name) {
|
|
|
|
cfg.Metrics.EnableInfluxDB = ctx.Bool(utils.MetricsEnableInfluxDBFlag.Name)
|
2021-01-18 13:36:05 +00:00
|
|
|
}
|
2022-06-27 16:22:36 +00:00
|
|
|
if ctx.IsSet(utils.MetricsInfluxDBEndpointFlag.Name) {
|
|
|
|
cfg.Metrics.InfluxDBEndpoint = ctx.String(utils.MetricsInfluxDBEndpointFlag.Name)
|
2021-01-18 13:36:05 +00:00
|
|
|
}
|
2022-06-27 16:22:36 +00:00
|
|
|
if ctx.IsSet(utils.MetricsInfluxDBDatabaseFlag.Name) {
|
|
|
|
cfg.Metrics.InfluxDBDatabase = ctx.String(utils.MetricsInfluxDBDatabaseFlag.Name)
|
2021-01-18 13:36:05 +00:00
|
|
|
}
|
2022-06-27 16:22:36 +00:00
|
|
|
if ctx.IsSet(utils.MetricsInfluxDBUsernameFlag.Name) {
|
|
|
|
cfg.Metrics.InfluxDBUsername = ctx.String(utils.MetricsInfluxDBUsernameFlag.Name)
|
2021-01-18 13:36:05 +00:00
|
|
|
}
|
2022-06-27 16:22:36 +00:00
|
|
|
if ctx.IsSet(utils.MetricsInfluxDBPasswordFlag.Name) {
|
|
|
|
cfg.Metrics.InfluxDBPassword = ctx.String(utils.MetricsInfluxDBPasswordFlag.Name)
|
2021-01-18 13:36:05 +00:00
|
|
|
}
|
2022-06-27 16:22:36 +00:00
|
|
|
if ctx.IsSet(utils.MetricsInfluxDBTagsFlag.Name) {
|
|
|
|
cfg.Metrics.InfluxDBTags = ctx.String(utils.MetricsInfluxDBTagsFlag.Name)
|
2021-01-18 13:36:05 +00:00
|
|
|
}
|
2022-06-27 16:22:36 +00:00
|
|
|
if ctx.IsSet(utils.MetricsEnableInfluxDBV2Flag.Name) {
|
|
|
|
cfg.Metrics.EnableInfluxDBV2 = ctx.Bool(utils.MetricsEnableInfluxDBV2Flag.Name)
|
2021-08-17 16:40:14 +00:00
|
|
|
}
|
2022-06-27 16:22:36 +00:00
|
|
|
if ctx.IsSet(utils.MetricsInfluxDBTokenFlag.Name) {
|
|
|
|
cfg.Metrics.InfluxDBToken = ctx.String(utils.MetricsInfluxDBTokenFlag.Name)
|
2021-08-17 16:40:14 +00:00
|
|
|
}
|
2022-06-27 16:22:36 +00:00
|
|
|
if ctx.IsSet(utils.MetricsInfluxDBBucketFlag.Name) {
|
|
|
|
cfg.Metrics.InfluxDBBucket = ctx.String(utils.MetricsInfluxDBBucketFlag.Name)
|
2021-08-17 16:40:14 +00:00
|
|
|
}
|
2022-06-27 16:22:36 +00:00
|
|
|
if ctx.IsSet(utils.MetricsInfluxDBOrganizationFlag.Name) {
|
|
|
|
cfg.Metrics.InfluxDBOrganization = ctx.String(utils.MetricsInfluxDBOrganizationFlag.Name)
|
2021-08-17 16:40:14 +00:00
|
|
|
}
|
2021-01-18 13:36:05 +00:00
|
|
|
}
|
2021-06-30 10:57:32 +00:00
|
|
|
|
|
|
|
func deprecated(field string) bool {
|
2021-07-06 20:03:09 +00:00
|
|
|
switch field {
|
|
|
|
case "ethconfig.Config.EVMInterpreter":
|
|
|
|
return true
|
|
|
|
case "ethconfig.Config.EWASMInterpreter":
|
|
|
|
return true
|
|
|
|
default:
|
|
|
|
return false
|
|
|
|
}
|
2021-06-30 10:57:32 +00:00
|
|
|
}
|
2021-08-25 20:34:22 +00:00
|
|
|
|
|
|
|
func setAccountManagerBackends(stack *node.Node) error {
|
|
|
|
conf := stack.Config()
|
|
|
|
am := stack.AccountManager()
|
|
|
|
keydir := stack.KeyStoreDir()
|
|
|
|
scryptN := keystore.StandardScryptN
|
|
|
|
scryptP := keystore.StandardScryptP
|
|
|
|
if conf.UseLightweightKDF {
|
|
|
|
scryptN = keystore.LightScryptN
|
|
|
|
scryptP = keystore.LightScryptP
|
|
|
|
}
|
|
|
|
|
|
|
|
// Assemble the supported backends
|
|
|
|
if len(conf.ExternalSigner) > 0 {
|
|
|
|
log.Info("Using external signer", "url", conf.ExternalSigner)
|
|
|
|
if extapi, err := external.NewExternalBackend(conf.ExternalSigner); err == nil {
|
|
|
|
am.AddBackend(extapi)
|
|
|
|
return nil
|
|
|
|
} else {
|
|
|
|
return fmt.Errorf("error connecting to external signer: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// For now, we're using EITHER external signer OR local signers.
|
|
|
|
// If/when we implement some form of lockfile for USB and keystore wallets,
|
|
|
|
// we can have both, but it's very confusing for the user to see the same
|
|
|
|
// accounts in both externally and locally, plus very racey.
|
|
|
|
am.AddBackend(keystore.NewKeyStore(keydir, scryptN, scryptP))
|
|
|
|
if conf.USB {
|
|
|
|
// Start a USB hub for Ledger hardware wallets
|
|
|
|
if ledgerhub, err := usbwallet.NewLedgerHub(); err != nil {
|
|
|
|
log.Warn(fmt.Sprintf("Failed to start Ledger hub, disabling: %v", err))
|
|
|
|
} else {
|
|
|
|
am.AddBackend(ledgerhub)
|
|
|
|
}
|
|
|
|
// Start a USB hub for Trezor hardware wallets (HID version)
|
|
|
|
if trezorhub, err := usbwallet.NewTrezorHubWithHID(); err != nil {
|
|
|
|
log.Warn(fmt.Sprintf("Failed to start HID Trezor hub, disabling: %v", err))
|
|
|
|
} else {
|
|
|
|
am.AddBackend(trezorhub)
|
|
|
|
}
|
|
|
|
// Start a USB hub for Trezor hardware wallets (WebUSB version)
|
|
|
|
if trezorhub, err := usbwallet.NewTrezorHubWithWebUSB(); err != nil {
|
|
|
|
log.Warn(fmt.Sprintf("Failed to start WebUSB Trezor hub, disabling: %v", err))
|
|
|
|
} else {
|
|
|
|
am.AddBackend(trezorhub)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if len(conf.SmartCardDaemonPath) > 0 {
|
|
|
|
// Start a smart card hub
|
|
|
|
if schub, err := scwallet.NewHub(conf.SmartCardDaemonPath, scwallet.Scheme, keydir); err != nil {
|
|
|
|
log.Warn(fmt.Sprintf("Failed to start smart card hub, disabling: %v", err))
|
|
|
|
} else {
|
|
|
|
am.AddBackend(schub)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|