2021-11-24 11:12:25 +00:00
|
|
|
# Nimbus
|
|
|
|
# Copyright (c) 2021 Status Research & Development GmbH
|
|
|
|
# Licensed and distributed under either of
|
|
|
|
# * MIT license (license terms in the root directory or at https://opensource.org/licenses/MIT).
|
|
|
|
# * Apache v2 license (license terms in the root directory or at https://www.apache.org/licenses/LICENSE-2.0).
|
|
|
|
# at your option. This file may not be copied, modified, or distributed except according to those terms.
|
|
|
|
|
|
|
|
{.push raises: [Defect].}
|
|
|
|
|
|
|
|
import
|
|
|
|
std/[os, strutils],
|
2022-02-17 13:13:39 +00:00
|
|
|
chronicles, stew/io2,
|
2021-11-24 11:12:25 +00:00
|
|
|
eth/p2p/discoveryv5/enr
|
|
|
|
|
|
|
|
iterator strippedLines(filename: string): string {.raises: [ref IOError].} =
|
|
|
|
for line in lines(filename):
|
|
|
|
let stripped = strip(line)
|
|
|
|
if stripped.startsWith('#'): # Comments
|
|
|
|
continue
|
|
|
|
|
|
|
|
if stripped.len > 0:
|
|
|
|
yield stripped
|
|
|
|
|
|
|
|
proc addBootstrapNode(bootstrapAddr: string,
|
|
|
|
bootstrapEnrs: var seq[Record]) =
|
|
|
|
var enrRec: enr.Record
|
|
|
|
if enrRec.fromURI(bootstrapAddr):
|
|
|
|
bootstrapEnrs.add enrRec
|
|
|
|
else:
|
|
|
|
warn "Ignoring invalid bootstrap ENR", bootstrapAddr
|
|
|
|
|
|
|
|
proc loadBootstrapFile*(bootstrapFile: string,
|
|
|
|
bootstrapEnrs: var seq[Record]) =
|
|
|
|
if bootstrapFile.len == 0: return
|
|
|
|
let ext = splitFile(bootstrapFile).ext
|
|
|
|
if cmpIgnoreCase(ext, ".txt") == 0 or cmpIgnoreCase(ext, ".enr") == 0 :
|
|
|
|
try:
|
|
|
|
for ln in strippedLines(bootstrapFile):
|
|
|
|
addBootstrapNode(ln, bootstrapEnrs)
|
|
|
|
except IOError as e:
|
|
|
|
fatal "Could not read bootstrap file", msg = e.msg
|
|
|
|
quit 1
|
|
|
|
else:
|
|
|
|
fatal "Unknown bootstrap file format", ext
|
|
|
|
quit 1
|
2022-02-17 13:13:39 +00:00
|
|
|
|
|
|
|
# Note:
|
|
|
|
# Currently just works with the network private key stored as hex in a file.
|
|
|
|
# In the future it would be nice to re-use keystore from nimbus-eth2 for this.
|
|
|
|
# However that would require the pull the keystore.nim and parts of
|
|
|
|
# keystore_management.nim out of nimbus-eth2.
|
|
|
|
proc getPersistentNetKey*(
|
|
|
|
rng: var BrHmacDrbgContext, keyFilePath: string, dataDir: string):
|
|
|
|
PrivateKey =
|
2022-03-18 12:06:57 +00:00
|
|
|
logScope:
|
|
|
|
key_file = keyFilePath
|
|
|
|
|
2022-02-17 13:13:39 +00:00
|
|
|
if fileAccessible(keyFilePath, {AccessFlags.Find}):
|
2022-03-18 12:06:57 +00:00
|
|
|
info "Network key file is present, reading key"
|
2022-02-17 13:13:39 +00:00
|
|
|
|
|
|
|
let readResult = readAllChars(keyFilePath)
|
|
|
|
if readResult.isErr():
|
2022-03-18 12:06:57 +00:00
|
|
|
fatal "Could not load network key file", error = readResult.error
|
2022-02-17 13:13:39 +00:00
|
|
|
quit QuitFailure
|
|
|
|
|
|
|
|
let netKeyInHex = readResult.get()
|
|
|
|
if netKeyInHex.len() == 64:
|
|
|
|
let netKey = PrivateKey.fromHex(netkeyInHex)
|
|
|
|
if netKey.isOk():
|
2022-03-18 12:06:57 +00:00
|
|
|
info "Network key was successfully read"
|
2022-02-17 13:13:39 +00:00
|
|
|
netKey.get()
|
|
|
|
else:
|
2022-03-18 12:06:57 +00:00
|
|
|
fatal "Invalid private key from file", error = netKey.error
|
2022-02-17 13:13:39 +00:00
|
|
|
quit QuitFailure
|
|
|
|
else:
|
2022-03-18 12:06:57 +00:00
|
|
|
fatal "Invalid length of private in file"
|
2022-02-17 13:13:39 +00:00
|
|
|
quit QuitFailure
|
|
|
|
|
|
|
|
else:
|
2022-03-18 12:06:57 +00:00
|
|
|
info "Network key file is missing, creating a new one"
|
2022-02-17 13:13:39 +00:00
|
|
|
let key = PrivateKey.random(rng)
|
|
|
|
|
2022-03-18 12:06:57 +00:00
|
|
|
let writeResult = io2.writeFile(keyFilePath, $key)
|
|
|
|
if writeResult.isErr:
|
|
|
|
fatal "Failed to write the network key file", errno = writeResult.error
|
2022-02-17 13:13:39 +00:00
|
|
|
quit 1
|
|
|
|
|
2022-03-18 12:06:57 +00:00
|
|
|
info "New network key file was created"
|
2022-02-17 13:13:39 +00:00
|
|
|
|
|
|
|
key
|