# beacon_chain # Copyright (c) 2018-2024 Status Research & Development GmbH # Licensed and distributed under either of # * MIT license (license terms in the root directory or at https://opensource.org/licenses/MIT). # * Apache v2 license (license terms in the root directory or at https://www.apache.org/licenses/LICENSE-2.0). # at your option. This file may not be copied, modified, or distributed except according to those terms. {.push raises: [].} import std/[options, unicode, uri], metrics, chronicles, chronicles/options as chroniclesOptions, confutils, confutils/defs, confutils/std/net, confutils/toml/defs as confTomlDefs, confutils/toml/std/net as confTomlNet, confutils/toml/std/uri as confTomlUri, serialization/errors, stew/[io2, byteutils], unicodedb/properties, normalize, eth/common/eth_types as commonEthTypes, eth/net/nat, eth/p2p/discoveryv5/enr, json_serialization, web3/[primitives, confutils_defs], chronos/transports/common, kzg4844/kzg, ./spec/[engine_authentication, keystore, network, crypto], ./spec/datatypes/base, ./networking/network_metadata, ./validators/slashing_protection_common, ./el/el_conf, ./filepath from std/os import getHomeDir, parentDir, `/` from std/strutils import parseBiggestUInt, replace from consensus_object_pools/block_pools_types_light_client import LightClientDataImportMode export uri, nat, enr, defaultEth2TcpPort, enabledLogLevel, defs, parseCmdArg, completeCmdArg, network_metadata, el_conf, network, BlockHashOrNumber, confTomlDefs, confTomlNet, confTomlUri, LightClientDataImportMode declareGauge network_name, "network name", ["name"] const # TODO: How should we select between IPv4 and IPv6 # Maybe there should be a config option for this. defaultAdminListenAddress* = (static parseIpAddress("127.0.0.1")) defaultSigningNodeRequestTimeout* = 60 defaultBeaconNode* = "http://127.0.0.1:" & $defaultEth2RestPort defaultBeaconNodeUri* = parseUri(defaultBeaconNode) defaultGasLimit* = 36_000_000 defaultAdminListenAddressDesc* = $defaultAdminListenAddress defaultBeaconNodeDesc = $defaultBeaconNode when defined(windows): {.pragma: windowsOnly.} {.pragma: posixOnly, hidden.} else: {.pragma: windowsOnly, hidden.} {.pragma: posixOnly.} type BNStartUpCmd* {.pure.} = enum noCommand deposits wallets record web3 slashingdb trustedNodeSync WalletsCmd* {.pure.} = enum create = "Creates a new EIP-2386 wallet" restore = "Restores a wallet from cold storage" list = "Lists details about all wallets" DepositsCmd* {.pure.} = enum createTestnetDeposits = "Creates validator keystores and deposits for testnet usage" `import` = "Imports password-protected keystores interactively" # status = "Displays status information about all deposits" exit = "Submits a validator voluntary exit" SNStartUpCmd* = enum SNNoCommand RecordCmd* {.pure.} = enum create = "Create a new ENR" print = "Print the content of a given ENR" Web3Cmd* {.pure.} = enum test = "Test a web3 provider" SlashingDbKind* {.pure.} = enum v1 v2 both StdoutLogKind* {.pure.} = enum Auto = "auto" Colors = "colors" NoColors = "nocolors" Json = "json" None = "none" HistoryMode* {.pure.} = enum Archive = "archive" Prune = "prune" SlashProtCmd* = enum `import` = "Import a EIP-3076 slashing protection interchange file" `export` = "Export a EIP-3076 slashing protection interchange file" # migrateAll = "Export and remove the whole validator slashing protection DB." # migrate = "Export and remove specified validators from Nimbus." ImportMethod* {.pure.} = enum Normal = "normal" SingleSalt = "single-salt" BlockMonitoringType* {.pure.} = enum Disabled = "disabled" Poll = "poll" Event = "event" Web3SignerUrl* = object url*: Uri provenBlockProperties*: seq[string] # empty if this is not a verifying Web3Signer LongRangeSyncMode* {.pure.} = enum Light = "light", Lenient = "lenient" BeaconNodeConf* = object configFile* {. desc: "Loads the configuration from a TOML file" name: "config-file" .}: Option[InputFile] logLevel* {. desc: "Sets the log level for process and topics (e.g. \"DEBUG; TRACE:discv5,libp2p; REQUIRED:none; DISABLED:none\")" defaultValue: "INFO" name: "log-level" .}: string logStdout* {. hidden desc: "Specifies what kind of logs should be written to stdout (auto, colors, nocolors, json)" defaultValueDesc: "auto" defaultValue: StdoutLogKind.Auto name: "log-format" .}: StdoutLogKind logFile* {. desc: "Specifies a path for the written JSON log file (deprecated)" name: "log-file" .}: Option[OutFile] eth2Network* {. desc: "The Eth2 network to join" defaultValueDesc: "mainnet" name: "network" .}: Option[string] dataDir* {. desc: "The directory where nimbus will store all blockchain data" defaultValue: config.defaultDataDir() defaultValueDesc: "" abbr: "d" name: "data-dir" .}: OutDir validatorsDirFlag* {. desc: "A directory containing validator keystores" name: "validators-dir" .}: Option[InputDir] verifyingWeb3Signers* {. desc: "Remote Web3Signer URL that will be used as a source of validators" name: "verifying-web3-signer-url" .}: seq[Uri] provenBlockProperties* {. desc: "The field path of a block property that will be sent for verification to the verifying Web3Signer (for example \".execution_payload.fee_recipient\")" name: "proven-block-property" .}: seq[string] web3Signers* {. desc: "Remote Web3Signer URL that will be used as a source of validators" name: "web3-signer-url" .}: seq[Uri] web3signerUpdateInterval* {. desc: "Number of seconds between validator list updates" name: "web3-signer-update-interval" defaultValue: 3600 .}: Natural secretsDirFlag* {. desc: "A directory containing validator keystore passwords" name: "secrets-dir" .}: Option[InputDir] walletsDirFlag* {. desc: "A directory containing wallet files" name: "wallets-dir" .}: Option[InputDir] eraDirFlag* {. hidden desc: "A directory containing era files" name: "era-dir" .}: Option[InputDir] web3ForcePolling* {. hidden desc: "Force the use of polling when determining the head block of Eth1 (obsolete)" name: "web3-force-polling" .}: Option[bool] web3Urls* {. desc: "One or more execution layer Engine API URLs" name: "web3-url" .}: seq[EngineApiUrlConfigValue] elUrls* {. desc: "One or more execution layer Engine API URLs" name: "el" .}: seq[EngineApiUrlConfigValue] noEl* {. defaultValue: false desc: "Don't use an EL. The node will remain optimistically synced and won't be able to perform validator duties" name: "no-el" .}: bool optimistic* {. hidden # deprecated > 22.12 desc: "Run the node in optimistic mode, allowing it to optimistically sync without an execution client (flag deprecated, always on)" name: "optimistic".}: Option[bool] requireEngineAPI* {. hidden # Deprecated > 22.9 desc: "Require Nimbus to be configured with an Engine API end-point after the Bellatrix fork epoch" name: "require-engine-api-in-bellatrix" .}: Option[bool] nonInteractive* {. desc: "Do not display interactive prompts. Quit on missing configuration" name: "non-interactive" .}: bool netKeyFile* {. desc: "Source of network (secp256k1) private key file " & "(random|)" defaultValue: "random", name: "netkey-file" .}: string netKeyInsecurePassword* {. desc: "Use pre-generated INSECURE password for network private key file" defaultValue: false, name: "insecure-netkey-password" .}: bool agentString* {. defaultValue: "nimbus", desc: "Node agent string which is used as identifier in network" name: "agent-string" .}: string subscribeAllSubnets* {. defaultValue: false, desc: "Subscribe to all subnet topics when gossiping" name: "subscribe-all-subnets" .}: bool peerdasSupernode* {. hidden defaultValue: false, desc: "Subscribe to all column subnets, thereby becoming a peerdas supernode" name: "debug-peerdas-supernode" .}: bool slashingDbKind* {. hidden defaultValue: SlashingDbKind.v2 desc: "The slashing DB flavour to use" name: "slashing-db-kind" .}: SlashingDbKind numThreads* {. defaultValue: 0, desc: "Number of worker threads (\"0\" = use as many threads as there are CPU cores available)" name: "num-threads" .}: int # https://github.com/ethereum/execution-apis/blob/v1.0.0-beta.3/src/engine/authentication.md#key-distribution jwtSecret* {. desc: "A file containing the hex-encoded 256 bit secret key to be used for verifying/generating JWT tokens" name: "jwt-secret" .}: Option[InputFile] case cmd* {. command defaultValue: BNStartUpCmd.noCommand .}: BNStartUpCmd of BNStartUpCmd.noCommand: runAsServiceFlag* {. windowsOnly defaultValue: false, desc: "Run as a Windows service" name: "run-as-service" .}: bool bootstrapNodes* {. desc: "Specifies one or more bootstrap nodes to use when connecting to the network" abbr: "b" name: "bootstrap-node" .}: seq[string] bootstrapNodesFile* {. desc: "Specifies a line-delimited file of bootstrap Ethereum network addresses" defaultValue: "" name: "bootstrap-file" .}: InputFile listenAddress* {. desc: "Listening address for the Ethereum LibP2P and Discovery v5 traffic" defaultValueDesc: "*" name: "listen-address" .}: Option[IpAddress] tcpPort* {. desc: "Listening TCP port for Ethereum LibP2P traffic" defaultValue: defaultEth2TcpPort defaultValueDesc: $defaultEth2TcpPortDesc name: "tcp-port" .}: Port udpPort* {. desc: "Listening UDP port for node discovery" defaultValue: defaultEth2TcpPort defaultValueDesc: $defaultEth2TcpPortDesc name: "udp-port" .}: Port maxPeers* {. desc: "The target number of peers to connect to" defaultValue: 160 # 5 (fanout) * 64 (subnets) / 2 (subs) for a heathy mesh name: "max-peers" .}: int hardMaxPeers* {. desc: "The maximum number of peers to connect to. Defaults to maxPeers * 1.5" name: "hard-max-peers" .}: Option[int] nat* {. desc: "Specify method to use for determining public address. " & "Must be one of: any, none, upnp, pmp, extip:" defaultValue: NatConfig(hasExtIp: false, nat: NatAny) defaultValueDesc: "any" name: "nat" .}: NatConfig enrAutoUpdate* {. desc: "Discovery can automatically update its ENR with the IP address " & "and UDP port as seen by other nodes it communicates with. " & "This option allows to enable/disable this functionality" defaultValue: false name: "enr-auto-update" .}: bool weakSubjectivityCheckpoint* {. desc: "Weak subjectivity checkpoint in the format block_root:epoch_number" name: "weak-subjectivity-checkpoint" .}: Option[Checkpoint] externalBeaconApiUrl* {. desc: "External beacon API to use for syncing (on empty database)" name: "external-beacon-api-url" .}: Option[string] syncLightClient* {. desc: "Accelerate sync using light client" defaultValue: true name: "sync-light-client" .}: bool trustedBlockRoot* {. desc: "Recent trusted finalized block root to sync from external " & "beacon API (with `--external-beacon-api-url`). " & "Uses the light client sync protocol to obtain the latest " & "finalized checkpoint (LC is initialized from trusted block root)" name: "trusted-block-root" .}: Option[Eth2Digest] trustedStateRoot* {. desc: "Recent trusted finalized state root to sync from external " & "beacon API (with `--external-beacon-api-url`)" name: "trusted-state-root" .}: Option[Eth2Digest] finalizedCheckpointState* {. desc: "SSZ file specifying a recent finalized state" name: "finalized-checkpoint-state" .}: Option[InputFile] genesisState* {. desc: "SSZ file specifying the genesis state of the network (for networks without a built-in genesis state)" name: "genesis-state" .}: Option[InputFile] genesisStateUrl* {. desc: "URL for obtaining the genesis state of the network (for networks without a built-in genesis state)" name: "genesis-state-url" .}: Option[Uri] finalizedDepositTreeSnapshot* {. desc: "SSZ file specifying a recent finalized EIP-4881 deposit tree snapshot" name: "finalized-deposit-tree-snapshot" .}: Option[InputFile] finalizedCheckpointBlock* {. hidden desc: "SSZ file specifying a recent finalized block" name: "finalized-checkpoint-block" .}: Option[InputFile] nodeName* {. desc: "A name for this node that will appear in the logs. " & "If you set this to 'auto', a persistent automatically generated ID will be selected for each --data-dir folder" defaultValue: "" name: "node-name" .}: string graffiti* {. desc: "The graffiti value that will appear in proposed blocks. " & "You can use a 0x-prefixed hex encoded string to specify raw bytes" name: "graffiti" .}: Option[GraffitiBytes] strictVerification* {. hidden desc: "Specify whether to verify finalization occurs on schedule (debug only)" defaultValue: false name: "verify-finalization" .}: bool stopAtEpoch* {. hidden desc: "The wall-time epoch at which to exit the program. (for testing purposes)" defaultValue: 0 name: "debug-stop-at-epoch" .}: uint64 stopAtSyncedEpoch* {. hidden desc: "The synced epoch at which to exit the program. (for testing purposes)" defaultValue: 0 name: "stop-at-synced-epoch" .}: uint64 metricsEnabled* {. desc: "Enable the metrics server" defaultValue: false name: "metrics" .}: bool metricsAddress* {. desc: "Listening address of the metrics server" defaultValue: defaultAdminListenAddress defaultValueDesc: $defaultAdminListenAddressDesc name: "metrics-address" .}: IpAddress metricsPort* {. desc: "Listening HTTP port of the metrics server" defaultValue: 8008 name: "metrics-port" .}: Port statusBarEnabled* {. posixOnly desc: "Display a status bar at the bottom of the terminal screen" defaultValue: true name: "status-bar" .}: bool statusBarContents* {. posixOnly desc: "Textual template for the contents of the status bar" defaultValue: "peers: $connected_peers;" & "finalized: $finalized_root:$finalized_epoch;" & "head: $head_root:$head_epoch:$head_epoch_slot$next_consensus_fork;" & "time: $epoch:$epoch_slot ($slot);" & "sync: $sync_status|" & "ETH: $attached_validators_balance" defaultValueDesc: "" name: "status-bar-contents" .}: string rpcEnabled* {. # Deprecated > 1.7.0 hidden desc: "Deprecated for removal" name: "rpc" .}: Option[bool] rpcPort* {. # Deprecated > 1.7.0 hidden desc: "Deprecated for removal" name: "rpc-port" .}: Option[Port] rpcAddress* {. # Deprecated > 1.7.0 hidden desc: "Deprecated for removal" name: "rpc-address" .}: Option[IpAddress] restEnabled* {. desc: "Enable the REST server" defaultValue: false name: "rest" .}: bool restPort* {. desc: "Port for the REST server" defaultValue: defaultEth2RestPort defaultValueDesc: $defaultEth2RestPortDesc name: "rest-port" .}: Port restAddress* {. desc: "Listening address of the REST server" defaultValue: defaultAdminListenAddress defaultValueDesc: $defaultAdminListenAddressDesc name: "rest-address" .}: IpAddress restAllowedOrigin* {. desc: "Limit the access to the REST API to a particular hostname " & "(for CORS-enabled clients such as browsers)" name: "rest-allow-origin" .}: Option[string] restCacheSize* {. defaultValue: 3 desc: "The maximum number of recently accessed states that are kept in " & "memory. Speeds up requests obtaining information for consecutive " & "slots or epochs." name: "rest-statecache-size" .}: Natural restCacheTtl* {. defaultValue: 60 desc: "The number of seconds to keep recently accessed states in memory" name: "rest-statecache-ttl" .}: Natural restRequestTimeout* {. defaultValue: 0 defaultValueDesc: "infinite" desc: "The number of seconds to wait until complete REST request " & "will be received" name: "rest-request-timeout" .}: Natural restMaxRequestBodySize* {. defaultValue: 16_384 desc: "Maximum size of REST request body (kilobytes)" name: "rest-max-body-size" .}: Natural restMaxRequestHeadersSize* {. defaultValue: 128 desc: "Maximum size of REST request headers (kilobytes)" name: "rest-max-headers-size" .}: Natural ## NOTE: If you going to adjust this value please check value ## ``ClientMaximumValidatorIds`` and comments in ## `spec/eth2_apis/rest_types.nim`. This values depend on each other. keymanagerEnabled* {. desc: "Enable the REST keymanager API" defaultValue: false name: "keymanager" .}: bool keymanagerPort* {. desc: "Listening port for the REST keymanager API" defaultValue: defaultEth2RestPort defaultValueDesc: $defaultEth2RestPortDesc name: "keymanager-port" .}: Port keymanagerAddress* {. desc: "Listening port for the REST keymanager API" defaultValue: defaultAdminListenAddress defaultValueDesc: $defaultAdminListenAddressDesc name: "keymanager-address" .}: IpAddress keymanagerAllowedOrigin* {. desc: "Limit the access to the Keymanager API to a particular hostname " & "(for CORS-enabled clients such as browsers)" name: "keymanager-allow-origin" .}: Option[string] keymanagerTokenFile* {. desc: "A file specifying the authorization token required for accessing the keymanager API" name: "keymanager-token-file" .}: Option[InputFile] lightClientDataServe* {. desc: "Serve data for enabling light clients to stay in sync with the network" defaultValue: true name: "light-client-data-serve" .}: bool lightClientDataImportMode* {. desc: "Which classes of light client data to import. " & "Must be one of: none, only-new, full (slow startup), on-demand (may miss validator duties)" defaultValue: LightClientDataImportMode.OnlyNew defaultValueDesc: $LightClientDataImportMode.OnlyNew name: "light-client-data-import-mode" .}: LightClientDataImportMode lightClientDataMaxPeriods* {. desc: "Maximum number of sync committee periods to retain light client data" name: "light-client-data-max-periods" .}: Option[uint64] longRangeSync* {. hidden desc: "Enable long-range syncing (genesis sync)", defaultValue: LongRangeSyncMode.Lenient, name: "debug-long-range-sync".}: LongRangeSyncMode inProcessValidators* {. desc: "Disable the push model (the beacon node tells a signing process with the private keys of the validators what to sign and when) and load the validators in the beacon node itself" defaultValue: true # the use of the nimbus_signing_process binary by default will be delayed until async I/O over stdin/stdout is developed for the child process. name: "in-process-validators" .}: bool discv5Enabled* {. desc: "Enable Discovery v5" defaultValue: true name: "discv5" .}: bool dumpEnabled* {. desc: "Write SSZ dumps of blocks, attestations and states to data dir" defaultValue: false name: "dump" .}: bool directPeers* {. desc: "The list of privileged, secure and known peers to connect and maintain the connection to. This requires a not random netkey-file. In the multiaddress format like: /ip4/
/tcp//p2p/, or enr format (enr:-xx). Peering agreements are established out of band and must be reciprocal" name: "direct-peer" .}: seq[string] doppelgangerDetection* {. desc: "If enabled, the beacon node prudently listens for 2 epochs for attestations from a validator with the same index (a doppelganger), before sending an attestation itself. This protects against slashing (due to double-voting) but means you will miss two attestations when restarting." defaultValue: true name: "doppelganger-detection" .}: bool syncHorizon* {. hidden desc: "Number of empty slots to process before considering the client out of sync. Defaults to the number of slots in 10 minutes" defaultValue: defaultSyncHorizon defaultValueDesc: $defaultSyncHorizon name: "sync-horizon" .}: uint64 terminalTotalDifficultyOverride* {. hidden desc: "Deprecated for removal" name: "terminal-total-difficulty-override" .}: Option[string] validatorMonitorAuto* {. desc: "Monitor validator activity automatically for validators active on this beacon node" defaultValue: true name: "validator-monitor-auto" .}: bool validatorMonitorPubkeys* {. desc: "One or more validators to monitor - works best when --subscribe-all-subnets is enabled" name: "validator-monitor-pubkey" .}: seq[ValidatorPubKey] validatorMonitorDetails* {. desc: "Publish detailed metrics for each validator individually - may incur significant overhead with large numbers of validators" defaultValue: false name: "validator-monitor-details" .}: bool validatorMonitorTotals* {. hidden desc: "Deprecated in favour of --validator-monitor-details" name: "validator-monitor-totals" .}: Option[bool] safeSlotsToImportOptimistically* {. # Never unhidden or documented, and deprecated > 22.9.1 hidden desc: "Deprecated for removal" name: "safe-slots-to-import-optimistically" .}: Option[uint16] # Same option as appears in Lighthouse and Prysm # https://lighthouse-book.sigmaprime.io/suggested-fee-recipient.html # https://github.com/prysmaticlabs/prysm/pull/10312 suggestedFeeRecipient* {. desc: "Suggested fee recipient" name: "suggested-fee-recipient" .}: Option[Address] suggestedGasLimit* {. desc: "Suggested gas limit" defaultValue: defaultGasLimit name: "suggested-gas-limit" .}: uint64 payloadBuilderEnable* {. desc: "Enable external payload builder" defaultValue: false name: "payload-builder" .}: bool payloadBuilderUrl* {. desc: "Payload builder URL" defaultValue: "" name: "payload-builder-url" .}: string # Flag name and semantics borrowed from Prysm # https://github.com/prysmaticlabs/prysm/pull/12227/files localBlockValueBoost* {. desc: "Increase execution layer block values for builder bid " & "comparison by a percentage" defaultValue: 10 name: "local-block-value-boost" .}: uint8 historyMode* {. desc: "Retention strategy for historical data (archive/prune)" defaultValue: HistoryMode.Prune name: "history".}: HistoryMode # https://notes.ethereum.org/@bbusa/dencun-devnet-6 # "Please ensure that there is a way for us to specify the file through a # runtime flag such as --trusted-setup-file (or similar)." trustedSetupFile* {. hidden desc: "Experimental, debug option; could disappear at any time without warning" name: "temporary-debug-trusted-setup-file" .}: Option[string] bandwidthEstimate* {. hidden desc: "Bandwidth estimate for the node (bits per second)" name: "debug-bandwidth-estimate" .}: Option[Natural] of BNStartUpCmd.wallets: case walletsCmd* {.command.}: WalletsCmd of WalletsCmd.create: nextAccount* {. desc: "Initial value for the 'nextaccount' property of the wallet" name: "next-account" .}: Option[Natural] createdWalletNameFlag* {. desc: "An easy-to-remember name for the wallet of your choice" name: "name" .}: Option[WalletName] createdWalletFileFlag* {. desc: "Output wallet file" name: "out" .}: Option[OutFile] of WalletsCmd.restore: restoredWalletNameFlag* {. desc: "An easy-to-remember name for the wallet of your choice" name: "name" .}: Option[WalletName] restoredWalletFileFlag* {. desc: "Output wallet file" name: "out" .}: Option[OutFile] restoredDepositsCount* {. desc: "Expected number of deposits to recover. If not specified, " & "Nimbus will try to guess the number by inspecting the latest " & "beacon state" name: "deposits".}: Option[Natural] of WalletsCmd.list: discard of BNStartUpCmd.deposits: case depositsCmd* {.command.}: DepositsCmd of DepositsCmd.createTestnetDeposits: totalDeposits* {. desc: "Number of deposits to generate" defaultValue: 1 name: "count" .}: int existingWalletId* {. desc: "An existing wallet ID. If not specified, a new wallet will be created" name: "wallet" .}: Option[WalletName] outValidatorsDir* {. desc: "Output folder for validator keystores" defaultValue: "validators" name: "out-validators-dir" .}: string outSecretsDir* {. desc: "Output folder for randomly generated keystore passphrases" defaultValue: "secrets" name: "out-secrets-dir" .}: string outDepositsFile* {. desc: "The name of generated deposits file" name: "out-deposits-file" .}: Option[OutFile] newWalletNameFlag* {. desc: "An easy-to-remember name for the wallet of your choice" name: "new-wallet-name" .}: Option[WalletName] newWalletFileFlag* {. desc: "Output wallet file" name: "new-wallet-file" .}: Option[OutFile] #[ of DepositsCmd.status: discard ]# of DepositsCmd.`import`: importedDepositsDir* {. argument desc: "A directory with keystores to import" .}: Option[InputDir] importMethod* {. desc: "Specifies which import method will be used (" & "normal, single-salt)" defaultValue: ImportMethod.Normal name: "method" .}: ImportMethod of DepositsCmd.exit: exitedValidators* {. desc: "One or more validator index, public key or a keystore path of " & "the exited validator(s)" name: "validator" .}: seq[string] exitAllValidatorsFlag* {. desc: "Exit all validators in the specified data directory or validators directory" defaultValue: false name: "all" .}: bool exitAtEpoch* {. name: "epoch" defaultValueDesc: "immediately" desc: "The desired exit epoch" .}: Option[uint64] restUrlForExit* {. desc: "URL of the beacon node REST service" defaultValue: defaultBeaconNode defaultValueDesc: $defaultBeaconNodeDesc name: "rest-url" .}: string printData* {. desc: "Print signed exit message instead of publishing it" defaultValue: false name: "print" .}: bool of BNStartUpCmd.record: case recordCmd* {.command.}: RecordCmd of RecordCmd.create: ipExt* {. desc: "External IP address" name: "ip" .}: IpAddress tcpPortExt* {. desc: "External TCP port" name: "tcp-port" .}: Port udpPortExt* {. desc: "External UDP port" name: "udp-port" .}: Port seqNumber* {. desc: "Record sequence number" defaultValue: 1, name: "seq-number" .}: uint fields* {. desc: "Additional record key pairs, provide as :" name: "field" .}: seq[(string)] of RecordCmd.print: recordPrint* {. argument desc: "ENR URI of the record to print" name: "enr" .}: Record of BNStartUpCmd.web3: case web3Cmd* {.command.}: Web3Cmd of Web3Cmd.test: web3TestUrl* {. argument desc: "The web3 provider URL to test" name: "url" .}: Uri of BNStartUpCmd.slashingdb: case slashingdbCmd* {.command.}: SlashProtCmd of SlashProtCmd.`import`: importedInterchangeFile* {. desc: "EIP-3076 slashing protection interchange file to import" argument .}: InputFile of SlashProtCmd.`export`: exportedValidators* {. desc: "Limit the export to specific validators " & "(specified as numeric indices or public keys)" abbr: "v" name: "validator" .}: seq[PubKey0x] exportedInterchangeFile* {. desc: "EIP-3076 slashing protection interchange file to export" argument .}: OutFile of BNStartUpCmd.trustedNodeSync: trustedNodeUrl* {. desc: "URL of the REST API to sync from" defaultValue: defaultBeaconNode defaultValueDesc: $defaultBeaconNodeDesc name: "trusted-node-url" .}: string stateId* {. desc: "State id to sync to - this can be \"finalized\", a slot number or state hash or \"head\"" name: "state-id" .}: Option[string] blockId* {. hidden desc: "Block id to sync to - this can be a block root, slot number, \"finalized\" or \"head\" (deprecated)" .}: Option[string] lcTrustedBlockRoot* {. desc: "Recent trusted finalized block root to initialize light client from" name: "trusted-block-root" .}: Option[Eth2Digest] backfillBlocks* {. desc: "Backfill blocks directly from REST server instead of fetching via API" defaultValue: true name: "backfill" .}: bool reindex* {. desc: "Recreate historical state index at end of backfill, allowing full history access (requires full backfill)" defaultValue: false .}: bool downloadDepositSnapshot* {. desc: "Also try to download a snapshot of the deposit contract state" defaultValue: false name: "with-deposit-snapshot" .}: bool ValidatorClientConf* = object configFile* {. desc: "Loads the configuration from a TOML file" name: "config-file" .}: Option[InputFile] logLevel* {. desc: "Sets the log level" defaultValue: "INFO" name: "log-level" .}: string logStdout* {. hidden desc: "Specifies what kind of logs should be written to stdout (auto, colors, nocolors, json)" defaultValueDesc: "auto" defaultValue: StdoutLogKind.Auto name: "log-format" .}: StdoutLogKind logFile* {. desc: "Specifies a path for the written JSON log file (deprecated)" name: "log-file" .}: Option[OutFile] dataDir* {. desc: "The directory where nimbus will store all blockchain data" defaultValue: config.defaultDataDir() defaultValueDesc: "" abbr: "d" name: "data-dir" .}: OutDir doppelgangerDetection* {. # TODO This description is shared between the BN and the VC. # Extract it in a constant (confutils fix may be needed). desc: "If enabled, the validator client prudently listens for 2 epochs " & "for attestations from a validator with the same index " & "(a doppelganger), before sending an attestation itself. This " & "protects against slashing (due to double-voting) but means you " & "will miss two attestations when restarting." defaultValue: true name: "doppelganger-detection" .}: bool nonInteractive* {. desc: "Do not display interactive prompts. Quit on missing configuration" name: "non-interactive" .}: bool validatorsDirFlag* {. desc: "A directory containing validator keystores" name: "validators-dir" .}: Option[InputDir] verifyingWeb3Signers* {. desc: "Remote Web3Signer URL that will be used as a source of validators" name: "verifying-web3-signer-url" .}: seq[Uri] provenBlockProperties* {. desc: "The field path of a block property that will be sent for verification to the verifying Web3Signer (for example \".execution_payload.fee_recipient\")" name: "proven-block-property" .}: seq[string] web3signerUpdateInterval* {. desc: "Number of seconds between validator list updates" name: "web3-signer-update-interval" defaultValue: 3600 .}: Natural web3Signers* {. desc: "Remote Web3Signer URL that will be used as a source of validators" name: "web3-signer-url" .}: seq[Uri] secretsDirFlag* {. desc: "A directory containing validator keystore passwords" name: "secrets-dir" .}: Option[InputDir] restRequestTimeout* {. defaultValue: 0 defaultValueDesc: "infinite" desc: "The number of seconds to wait until complete REST request " & "will be received" name: "rest-request-timeout" .}: Natural restMaxRequestBodySize* {. defaultValue: 16_384 desc: "Maximum size of REST request body (kilobytes)" name: "rest-max-body-size" .}: Natural restMaxRequestHeadersSize* {. defaultValue: 64 desc: "Maximum size of REST request headers (kilobytes)" name: "rest-max-headers-size" .}: Natural # Same option as appears in Lighthouse and Prysm # https://lighthouse-book.sigmaprime.io/suggested-fee-recipient.html # https://github.com/prysmaticlabs/prysm/pull/10312 suggestedFeeRecipient* {. desc: "Suggested fee recipient" name: "suggested-fee-recipient" .}: Option[Address] suggestedGasLimit* {. desc: "Suggested gas limit" defaultValue: defaultGasLimit name: "suggested-gas-limit" .}: uint64 keymanagerEnabled* {. desc: "Enable the REST keymanager API" defaultValue: false name: "keymanager" .}: bool keymanagerPort* {. desc: "Listening port for the REST keymanager API" defaultValue: defaultEth2RestPort defaultValueDesc: $defaultEth2RestPortDesc name: "keymanager-port" .}: Port keymanagerAddress* {. desc: "Listening port for the REST keymanager API" defaultValue: defaultAdminListenAddress defaultValueDesc: $defaultAdminListenAddressDesc name: "keymanager-address" .}: IpAddress keymanagerAllowedOrigin* {. desc: "Limit the access to the Keymanager API to a particular hostname " & "(for CORS-enabled clients such as browsers)" name: "keymanager-allow-origin" .}: Option[string] keymanagerTokenFile* {. desc: "A file specifying the authorizition token required for accessing the keymanager API" name: "keymanager-token-file" .}: Option[InputFile] metricsEnabled* {. desc: "Enable the metrics server (BETA)" defaultValue: false name: "metrics" .}: bool metricsAddress* {. desc: "Listening address of the metrics server (BETA)" defaultValue: defaultAdminListenAddress defaultValueDesc: $defaultAdminListenAddressDesc name: "metrics-address" .}: IpAddress metricsPort* {. desc: "Listening HTTP port of the metrics server (BETA)" defaultValue: 8108 name: "metrics-port" .}: Port graffiti* {. desc: "The graffiti value that will appear in proposed blocks. " & "You can use a 0x-prefixed hex encoded string to specify " & "raw bytes" name: "graffiti" .}: Option[GraffitiBytes] stopAtEpoch* {. desc: "A positive epoch selects the epoch at which to stop" defaultValue: 0 name: "debug-stop-at-epoch" .}: uint64 payloadBuilderEnable* {. desc: "Enable usage of beacon node with external payload builder (BETA)" defaultValue: false name: "payload-builder" .}: bool distributedEnabled* {. desc: "Enable usage of Obol middleware (BETA)" defaultValue: false name: "distributed".}: bool builderBoostFactor* {. desc: "Percentage multiplier to apply to the builder's payload value " & "when choosing between a builder payload header and payload " & "from the paired execution node." defaultValue: 100, name: "builder-boost-factor".}: uint64 beaconNodes* {. desc: "URL addresses to one or more beacon node HTTP REST APIs", defaultValue: @[defaultBeaconNodeUri] defaultValueDesc: $defaultBeaconNodeUri name: "beacon-node" .}: seq[Uri] monitoringType* {. desc: "Enable block monitoring which are seen by beacon node (BETA)" defaultValue: BlockMonitoringType.Event name: "block-monitor-type".}: BlockMonitoringType SigningNodeConf* = object configFile* {. desc: "Loads the configuration from a TOML file" name: "config-file" .}: Option[InputFile] logLevel* {. desc: "Sets the log level" defaultValue: "INFO" name: "log-level" .}: string logStdout* {. desc: "Specifies what kind of logs should be written to stdout (auto, colors, nocolors, json)" defaultValueDesc: "auto" defaultValue: StdoutLogKind.Auto name: "log-stdout" .}: StdoutLogKind logFile* {. desc: "Specifies a path for the written JSON log file" name: "log-file" .}: Option[OutFile] nonInteractive* {. desc: "Do not display interactive prompts. Quit on missing configuration" name: "non-interactive" .}: bool dataDir* {. desc: "The directory where nimbus will store validator's keys" defaultValue: config.defaultDataDir() defaultValueDesc: "" abbr: "d" name: "data-dir" .}: OutDir validatorsDirFlag* {. desc: "A directory containing validator keystores" name: "validators-dir" .}: Option[InputDir] secretsDirFlag* {. desc: "A directory containing validator keystore passwords" name: "secrets-dir" .}: Option[InputDir] expectedFeeRecipient* {. desc: "Signatures for blocks will require proofs of the specified " & "fee recipient" name: "expected-fee-recipient".}: Option[Address] serverIdent* {. desc: "Server identifier which will be used in HTTP Host header" name: "server-ident" .}: Option[string] requestTimeout* {. desc: "Request timeout, maximum time that node will wait for remote " & "client request (in seconds)" defaultValue: defaultSigningNodeRequestTimeout name: "request-timeout" .}: int bindPort* {. desc: "Port for the REST HTTP server" defaultValue: defaultEth2RestPort defaultValueDesc: $defaultEth2RestPortDesc name: "bind-port" .}: Port bindAddress* {. desc: "Listening address of the REST HTTP server" defaultValue: defaultAdminListenAddress defaultValueDesc: $defaultAdminListenAddressDesc name: "bind-address" .}: IpAddress tlsEnabled* {. desc: "Use secure TLS communication for REST server" defaultValue: false name: "tls" .}: bool tlsCertificate* {. desc: "Path to SSL certificate file" name: "tls-cert" .}: Option[InputFile] tlsPrivateKey* {. desc: "Path to SSL ceritificate's private key" name: "tls-key" .}: Option[InputFile] AnyConf* = BeaconNodeConf | ValidatorClientConf | SigningNodeConf Address = primitives.Address proc defaultDataDir*[Conf](config: Conf): string = let dataDir = when defined(windows): "AppData" / "Roaming" / "Nimbus" elif defined(macosx): "Library" / "Application Support" / "Nimbus" else: ".cache" / "nimbus" getHomeDir() / dataDir / "BeaconNode" func dumpDir(config: AnyConf): string = config.dataDir / "dump" func dumpDirInvalid*(config: AnyConf): string = config.dumpDir / "invalid" # things that failed validation func dumpDirIncoming*(config: AnyConf): string = config.dumpDir / "incoming" # things that couldn't be validated (missingparent etc) func dumpDirOutgoing*(config: AnyConf): string = config.dumpDir / "outgoing" # things we produced proc createDumpDirs*(config: BeaconNodeConf) = proc fail {.noreturn.} = raiseAssert "createDumpDirs should be used only in the right context" case config.cmd of BNStartUpCmd.noCommand: if config.dumpEnabled: if (let res = secureCreatePath(config.dumpDirInvalid); res.isErr): warn "Could not create dump directory", path = config.dumpDirInvalid, err = ioErrorMsg(res.error) if (let res = secureCreatePath(config.dumpDirIncoming); res.isErr): warn "Could not create dump directory", path = config.dumpDirIncoming, err = ioErrorMsg(res.error) if (let res = secureCreatePath(config.dumpDirOutgoing); res.isErr): warn "Could not create dump directory", path = config.dumpDirOutgoing, err = ioErrorMsg(res.error) else: fail() func parseCmdArg*(T: type Eth2Digest, input: string): T {.raises: [ValueError].} = Eth2Digest.fromHex(input) func completeCmdArg*(T: type Eth2Digest, input: string): seq[string] = return @[] func parseCmdArg*(T: type GraffitiBytes, input: string): T {.raises: [ValueError].} = GraffitiBytes.init(input) func completeCmdArg*(T: type GraffitiBytes, input: string): seq[string] = return @[] func parseCmdArg*(T: type BlockHashOrNumber, input: string): T {.raises: [ValueError].} = init(BlockHashOrNumber, input) func completeCmdArg*(T: type BlockHashOrNumber, input: string): seq[string] = return @[] func parseCmdArg*(T: type Uri, input: string): T {.raises: [ValueError].} = parseUri(input) func completeCmdArg*(T: type Uri, input: string): seq[string] = return @[] func parseCmdArg*(T: type PubKey0x, input: string): T {.raises: [ValueError].} = PubKey0x(hexToPaddedByteArray[RawPubKeySize](input)) func parseCmdArg*(T: type ValidatorPubKey, input: string): T {.raises: [ValueError].} = let res = ValidatorPubKey.fromHex(input) if res.isErr(): raise (ref ValueError)(msg: $res.error()) res.get() func completeCmdArg*(T: type PubKey0x, input: string): seq[string] = return @[] func parseCmdArg*(T: type Checkpoint, input: string): T {.raises: [ValueError].} = let sepIdx = find(input, ':') if sepIdx == -1 or sepIdx == input.len - 1: raise newException(ValueError, "The weak subjectivity checkpoint must be provided in the `block_root:epoch_number` format") var root: Eth2Digest hexToByteArrayStrict(input.toOpenArray(0, sepIdx - 1), root.data) T(root: root, epoch: parseBiggestUInt(input[sepIdx + 1 .. ^1]).Epoch) func completeCmdArg*(T: type Checkpoint, input: string): seq[string] = return @[] func parseCmdArg*(T: type Epoch, input: string): T {.raises: [ValueError].} = Epoch parseBiggestUInt(input) func completeCmdArg*(T: type Epoch, input: string): seq[string] = return @[] func isPrintable(rune: Rune): bool = # This can be eventually replaced by the `unicodeplus` package, but a single # proc does not justify the extra dependencies at the moment: # https://github.com/nitely/nim-unicodeplus # https://github.com/nitely/nim-segmentation rune == Rune(0x20) or unicodeCategory(rune) notin ctgC+ctgZ func parseCmdArg*(T: type WalletName, input: string): T {.raises: [ValueError].} = if input.len == 0: raise newException(ValueError, "The wallet name should not be empty") if input[0] == '_': raise newException(ValueError, "The wallet name should not start with an underscore") for rune in runes(input): if not rune.isPrintable: raise newException(ValueError, "The wallet name should consist only of printable characters") # From the Unicode Normalization FAQ (https://unicode.org/faq/normalization.html): # NFKC is the preferred form for identifiers, especially where there are security concerns # (see UTR #36 http://www.unicode.org/reports/tr36/) return T(toNFKC(input)) func completeCmdArg*(T: type WalletName, input: string): seq[string] = return @[] proc parseCmdArg*(T: type enr.Record, p: string): T {.raises: [ValueError].} = let res = enr.Record.fromURI(p) if res.isErr: raise newException(ValueError, "Invalid ENR:" & $res.error) res.value func completeCmdArg*(T: type enr.Record, val: string): seq[string] = return @[] func validatorsDir*[Conf](config: Conf): string = string config.validatorsDirFlag.get(InputDir(config.dataDir / "validators")) func secretsDir*[Conf](config: Conf): string = string config.secretsDirFlag.get(InputDir(config.dataDir / "secrets")) func walletsDir*(config: BeaconNodeConf): string = string config.walletsDirFlag.get(InputDir(config.dataDir / "wallets")) func eraDir*(config: BeaconNodeConf): string = # The era directory should be shared between networks of the same type.. string config.eraDirFlag.get(InputDir(config.dataDir / "era")) {.push warning[ProveField]:off.} # https://github.com/nim-lang/Nim/issues/22791 func outWalletName*(config: BeaconNodeConf): Option[WalletName] = proc fail {.noreturn.} = raiseAssert "outWalletName should be used only in the right context" case config.cmd of wallets: case config.walletsCmd of WalletsCmd.create: config.createdWalletNameFlag of WalletsCmd.restore: config.restoredWalletNameFlag of WalletsCmd.list: fail() of deposits: case config.depositsCmd of DepositsCmd.createTestnetDeposits: config.newWalletNameFlag else: fail() else: fail() {.pop.} {.push warning[ProveField]:off.} # https://github.com/nim-lang/Nim/issues/22791 func outWalletFile*(config: BeaconNodeConf): Option[OutFile] = proc fail {.noreturn.} = raiseAssert "outWalletFile should be used only in the right context" case config.cmd of wallets: case config.walletsCmd of WalletsCmd.create: config.createdWalletFileFlag of WalletsCmd.restore: config.restoredWalletFileFlag of WalletsCmd.list: fail() of deposits: case config.depositsCmd of DepositsCmd.createTestnetDeposits: config.newWalletFileFlag else: fail() else: fail() {.pop.} func databaseDir*(dataDir: OutDir): string = dataDir / "db" template databaseDir*(config: AnyConf): string = config.dataDir.databaseDir func runAsService*(config: BeaconNodeConf): bool = case config.cmd of noCommand: config.runAsServiceFlag else: false func web3SignerUrls*(conf: AnyConf): seq[Web3SignerUrl] = for url in conf.web3Signers: result.add Web3SignerUrl(url: url) for url in conf.verifyingWeb3Signers: result.add Web3SignerUrl(url: url, provenBlockProperties: conf.provenBlockProperties) template writeValue*(writer: var JsonWriter, value: TypedInputFile|InputFile|InputDir|OutPath|OutDir|OutFile) = writer.writeValue(string value) template raiseUnexpectedValue(r: var TomlReader, msg: string) = # TODO: We need to implement `raiseUnexpectedValue` for TOML, # so the correct line and column information can be included # in error messages: raise newException(SerializationError, msg) proc readValue*(r: var TomlReader, value: var Epoch) {.raises: [SerializationError, IOError].} = value = Epoch r.parseInt(uint64) proc readValue*(r: var TomlReader, value: var GraffitiBytes) {.raises: [SerializationError, IOError].} = try: value = GraffitiBytes.init(r.readValue(string)) except ValueError: r.raiseUnexpectedValue("A printable string or 0x-prefixed hex-encoded raw bytes expected") proc readValue*(r: var TomlReader, val: var NatConfig) {.raises: [SerializationError].} = val = try: parseCmdArg(NatConfig, r.readValue(string)) except CatchableError as err: raise newException(SerializationError, err.msg) proc readValue*(r: var TomlReader, a: var Eth2Digest) {.raises: [IOError, SerializationError].} = try: a = fromHex(type(a), r.readValue(string)) except ValueError: r.raiseUnexpectedValue("Hex string expected") proc readValue*(reader: var TomlReader, value: var ValidatorPubKey) {.raises: [SerializationError].} = let keyAsString = try: reader.readValue(string) except CatchableError: raiseUnexpectedValue(reader, "A hex-encoded string expected") let key = ValidatorPubKey.fromHex(keyAsString) if key.isOk: value = key.get else: # TODO: Can we provide better diagnostic? raiseUnexpectedValue(reader, "Valid hex-encoded public key expected") proc readValue*(r: var TomlReader, a: var PubKey0x) {.raises: [SerializationError].} = try: a = parseCmdArg(PubKey0x, r.readValue(string)) except CatchableError: r.raiseUnexpectedValue("a 0x-prefixed hex-encoded string expected") proc readValue*(r: var TomlReader, a: var WalletName) {.raises: [SerializationError].} = try: a = parseCmdArg(WalletName, r.readValue(string)) except CatchableError: r.raiseUnexpectedValue("string expected") proc readValue*(r: var TomlReader, a: var Address) {.raises: [SerializationError].} = try: a = parseCmdArg(Address, r.readValue(string)) except CatchableError: r.raiseUnexpectedValue("string expected") proc loadEth2Network*(eth2Network: Option[string]): Eth2NetworkMetadata = const defaultName = when const_preset == "gnosis": "gnosis" elif const_preset == "mainnet": "mainnet" else: "(unspecified)" network_name.set(2, labelValues = [eth2Network.get(otherwise = defaultName)]) if eth2Network.isSome: getMetadataForNetwork(eth2Network.get) else: when const_preset == "gnosis": getMetadataForNetwork("gnosis") elif const_preset == "mainnet": getMetadataForNetwork("mainnet") else: # Presumably other configurations can have other defaults, but for now # this simplifies the flow fatal "Must specify network on non-mainnet node" quit 1 template loadEth2Network*(config: BeaconNodeConf): Eth2NetworkMetadata = loadEth2Network(config.eth2Network) func defaultFeeRecipient*(conf: AnyConf): Opt[Eth1Address] = if conf.suggestedFeeRecipient.isSome: Opt.some conf.suggestedFeeRecipient.get else: # https://github.com/nim-lang/Nim/issues/19802 (static(Opt.none Eth1Address)) func defaultGraffitiBytes*(conf: AnyConf): GraffitiBytes = if conf.graffiti.isSome: conf.graffiti.get else: defaultGraffitiBytes() proc loadJwtSecret( rng: var HmacDrbgContext, dataDir: string, jwtSecret: Opt[InputFile], allowCreate: bool): Opt[seq[byte]] = # Some Web3 endpoints aren't compatible with JWT, but if explicitly chosen, # use it regardless. if jwtSecret.isSome or allowCreate: let secret = rng.checkJwtSecret(dataDir, jwtSecret) if secret.isErr: fatal "Specified a JWT secret file which couldn't be loaded", err = secret.error quit 1 Opt.some secret.get else: Opt.none seq[byte] func configJwtSecretOpt*(jwtSecret: Option[InputFile]): Opt[InputFile] = if jwtSecret.isSome: Opt.some jwtSecret.get else: Opt.none InputFile proc loadJwtSecret*( rng: var HmacDrbgContext, config: BeaconNodeConf, allowCreate: bool): Opt[seq[byte]] = rng.loadJwtSecret( string(config.dataDir), config.jwtSecret.configJwtSecretOpt, allowCreate) proc engineApiUrls*(config: BeaconNodeConf): seq[EngineApiUrl] = let elUrls = if config.noEl: return newSeq[EngineApiUrl]() elif config.elUrls.len == 0 and config.web3Urls.len == 0: @[getDefaultEngineApiUrl(config.jwtSecret)] else: config.elUrls (elUrls & config.web3Urls).toFinalEngineApiUrls( config.jwtSecret.configJwtSecretOpt) proc loadKzgTrustedSetup*(): Result[void, string] = const vendorDir = currentSourcePath.parentDir.replace('\\', '/') & "/../vendor" trustedSetup = staticRead( vendorDir & "/nim-kzg4844/kzg4844/csources/src/trusted_setup.txt") static: doAssert const_preset in ["mainnet", "gnosis", "minimal"] loadTrustedSetupFromString(trustedSetup, 0) proc loadKzgTrustedSetup*(trustedSetupPath: string): Result[void, string] = try: loadTrustedSetupFromString(readFile(trustedSetupPath), 0) except IOError as err: err(err.msg) proc formatIt*(v: Option[IpAddress]): string = if v.isSome(): $v.get() else: "*"