# compile time options here const libp2p_pubsub_sign {.booldefine.} = true libp2p_pubsub_verify {.booldefine.} = true import options, tables, chronos, switch, peer, peerinfo, connection, multiaddress, crypto/crypto, transports/[transport, tcptransport], muxers/[muxer, mplex/mplex, mplex/types], protocols/[identify, secure/secure], protocols/pubsub/[pubsub, gossipsub, floodsub] import protocols/secure/noise, protocols/secure/secio export switch, peer, peerinfo, connection, multiaddress, crypto type SecureProtocol* {.pure.} = enum Noise, Secio proc newStandardSwitch*(privKey = none(PrivateKey), address = MultiAddress.init("/ip4/127.0.0.1/tcp/0").tryGet(), triggerSelf = false, gossip = false, secureManagers: openarray[SecureProtocol] = [ # TODO investigate why we're getting fewer peers on public testnets with noise SecureProtocol.Secio, SecureProtocol.Noise, # array cos order matters ], verifySignature = libp2p_pubsub_verify, sign = libp2p_pubsub_sign, transportFlags: set[ServerFlags] = {}): Switch = proc createMplex(conn: Connection): Muxer = newMplex(conn) let seckey = privKey.get(otherwise = PrivateKey.random(ECDSA).tryGet()) peerInfo = PeerInfo.init(seckey, [address]) mplexProvider = newMuxerProvider(createMplex, MplexCodec) transports = @[Transport(TcpTransport.init(transportFlags))] muxers = {MplexCodec: mplexProvider}.toTable identify = newIdentify(peerInfo) var secureManagerInstances: seq[Secure] for sec in secureManagers: case sec of SecureProtocol.Noise: secureManagerInstances &= newNoise(seckey).Secure of SecureProtocol.Secio: secureManagerInstances &= newSecio(seckey).Secure let pubSub = if gossip: newPubSub(GossipSub, peerInfo = peerInfo, triggerSelf = triggerSelf, verifySignature = verifySignature, sign = sign).PubSub else: newPubSub(FloodSub, peerInfo = peerInfo, triggerSelf = triggerSelf, verifySignature = verifySignature, sign = sign).PubSub newSwitch( peerInfo, transports, identify, muxers, secureManagers = secureManagerInstances, pubSub = some(pubSub))