2020-10-21 09:54:29 +00:00
|
|
|
import
|
|
|
|
confutils, confutils/defs, confutils/std/net, chronicles, chronos,
|
|
|
|
libp2p/crypto/[crypto, secp],
|
|
|
|
eth/keys
|
|
|
|
|
|
|
|
type
|
|
|
|
FleetV1* = enum
|
|
|
|
none
|
|
|
|
prod
|
|
|
|
staging
|
|
|
|
test
|
|
|
|
|
|
|
|
WakuNodeConf* = object
|
|
|
|
logLevel* {.
|
|
|
|
desc: "Sets the log level"
|
|
|
|
defaultValue: LogLevel.INFO
|
|
|
|
name: "log-level" .}: LogLevel
|
|
|
|
|
|
|
|
listenAddress* {.
|
|
|
|
defaultValue: defaultListenAddress(config)
|
|
|
|
desc: "Listening address for the LibP2P traffic"
|
|
|
|
name: "listen-address"}: ValidIpAddress
|
|
|
|
|
|
|
|
libp2pTcpPort* {.
|
|
|
|
desc: "Libp2p TCP listening port (for Waku v2)"
|
|
|
|
defaultValue: 9000
|
|
|
|
name: "libp2p-tcp-port" .}: uint16
|
|
|
|
|
|
|
|
devp2pTcpPort* {.
|
|
|
|
desc: "Devp2p TCP listening port (for Waku v1)"
|
|
|
|
defaultValue: 30303
|
|
|
|
name: "devp2p-tcp-port" .}: uint16
|
|
|
|
|
|
|
|
udpPort* {.
|
|
|
|
desc: "UDP listening port"
|
|
|
|
defaultValue: 9000
|
|
|
|
name: "udp-port" .}: uint16
|
|
|
|
|
|
|
|
portsShift* {.
|
|
|
|
desc: "Add a shift to all default port numbers"
|
|
|
|
defaultValue: 0
|
|
|
|
name: "ports-shift" .}: uint16
|
|
|
|
|
|
|
|
nat* {.
|
|
|
|
desc: "Specify method to use for determining public address. " &
|
|
|
|
"Must be one of: any, none, upnp, pmp, extip:<IP>"
|
|
|
|
defaultValue: "any" .}: string
|
|
|
|
|
|
|
|
rpc* {.
|
|
|
|
desc: "Enable Waku RPC server"
|
|
|
|
defaultValue: false
|
|
|
|
name: "rpc" .}: bool
|
|
|
|
|
|
|
|
rpcAddress* {.
|
|
|
|
desc: "Listening address of the RPC server",
|
|
|
|
defaultValue: ValidIpAddress.init("127.0.0.1")
|
|
|
|
name: "rpc-address" }: ValidIpAddress
|
|
|
|
|
|
|
|
rpcPort* {.
|
|
|
|
desc: "Listening port of the RPC server"
|
|
|
|
defaultValue: 8545
|
|
|
|
name: "rpc-port" .}: uint16
|
|
|
|
|
|
|
|
metricsServer* {.
|
|
|
|
desc: "Enable the metrics server"
|
|
|
|
defaultValue: false
|
|
|
|
name: "metrics-server" .}: bool
|
|
|
|
|
|
|
|
metricsServerAddress* {.
|
|
|
|
desc: "Listening address of the metrics server"
|
|
|
|
defaultValue: ValidIpAddress.init("127.0.0.1")
|
|
|
|
name: "metrics-server-address" }: ValidIpAddress
|
|
|
|
|
|
|
|
metricsServerPort* {.
|
|
|
|
desc: "Listening HTTP port of the metrics server"
|
|
|
|
defaultValue: 8008
|
|
|
|
name: "metrics-server-port" .}: uint16
|
|
|
|
|
|
|
|
### Waku v1 options
|
|
|
|
fleetv1* {.
|
|
|
|
desc: "Select the Waku v1 fleet to connect to"
|
|
|
|
defaultValue: FleetV1.none
|
|
|
|
name: "fleetv1" .}: FleetV1
|
|
|
|
|
|
|
|
staticnodesv1* {.
|
|
|
|
desc: "Enode URL to directly connect with. Argument may be repeated"
|
|
|
|
name: "staticnodev1" .}: seq[string]
|
|
|
|
|
|
|
|
nodekeyv1* {.
|
|
|
|
desc: "DevP2P node private key as hex",
|
|
|
|
# TODO: can the rng be passed in somehow via Load?
|
|
|
|
defaultValue: keys.KeyPair.random(keys.newRng()[])
|
|
|
|
name: "nodekeyv1" .}: keys.KeyPair
|
|
|
|
|
|
|
|
wakuPow* {.
|
|
|
|
desc: "PoW requirement of Waku node.",
|
|
|
|
defaultValue: 0.002
|
|
|
|
name: "waku-pow" .}: float64
|
|
|
|
|
|
|
|
### Waku v2 options
|
|
|
|
staticnodesv2* {.
|
|
|
|
desc: "Multiaddr of peer to directly connect with. Argument may be repeated"
|
|
|
|
name: "staticnodev2" }: seq[string]
|
|
|
|
|
|
|
|
nodekeyv2* {.
|
|
|
|
desc: "P2P node private key as hex"
|
|
|
|
defaultValue: crypto.PrivateKey.random(Secp256k1, keys.newRng()[]).tryGet()
|
|
|
|
name: "nodekeyv2" }: crypto.PrivateKey
|
|
|
|
|
|
|
|
topics* {.
|
2020-10-28 05:19:07 +00:00
|
|
|
desc: "Default topics to subscribe to (space separated list)"
|
|
|
|
defaultValue: "/waku/2/default-waku/proto"
|
2020-10-21 09:54:29 +00:00
|
|
|
name: "topics" .}: string
|
|
|
|
|
|
|
|
store* {.
|
|
|
|
desc: "Flag whether to start store protocol",
|
2021-05-03 21:30:52 +00:00
|
|
|
defaultValue: true
|
2020-10-21 09:54:29 +00:00
|
|
|
name: "store" }: bool
|
2021-05-03 21:30:52 +00:00
|
|
|
|
|
|
|
persistmessages* {.
|
|
|
|
desc: "Enable message persistence: true|false",
|
|
|
|
defaultValue: false
|
|
|
|
name: "persist-messages" }: bool
|
2020-10-21 09:54:29 +00:00
|
|
|
|
|
|
|
filter* {.
|
|
|
|
desc: "Flag whether to start filter protocol",
|
|
|
|
defaultValue: false
|
|
|
|
name: "filter" }: bool
|
|
|
|
|
|
|
|
relay* {.
|
|
|
|
desc: "Flag whether to start relay protocol",
|
|
|
|
defaultValue: true
|
|
|
|
name: "relay" }: bool
|
|
|
|
|
|
|
|
storenode* {.
|
|
|
|
desc: "Multiaddr of peer to connect with for waku store protocol"
|
|
|
|
defaultValue: ""
|
|
|
|
name: "storenode" }: string
|
|
|
|
|
|
|
|
filternode* {.
|
|
|
|
desc: "Multiaddr of peer to connect with for waku filter protocol"
|
|
|
|
defaultValue: ""
|
|
|
|
name: "filternode" }: string
|
|
|
|
|
|
|
|
proc parseCmdArg*(T: type keys.KeyPair, p: TaintedString): T =
|
|
|
|
try:
|
|
|
|
let privkey = keys.PrivateKey.fromHex(string(p)).tryGet()
|
|
|
|
result = privkey.toKeyPair()
|
|
|
|
except CatchableError:
|
|
|
|
raise newException(ConfigurationError, "Invalid private key")
|
|
|
|
|
|
|
|
proc completeCmdArg*(T: type keys.KeyPair, val: TaintedString): seq[string] =
|
|
|
|
return @[]
|
|
|
|
|
|
|
|
proc parseCmdArg*(T: type crypto.PrivateKey, p: TaintedString): T =
|
|
|
|
let key = SkPrivateKey.init(p)
|
|
|
|
if key.isOk():
|
|
|
|
crypto.PrivateKey(scheme: Secp256k1, skkey: key.get())
|
|
|
|
else:
|
|
|
|
raise newException(ConfigurationError, "Invalid private key")
|
|
|
|
|
|
|
|
proc completeCmdArg*(T: type crypto.PrivateKey, val: TaintedString): seq[string] =
|
|
|
|
return @[]
|
|
|
|
|
|
|
|
proc parseCmdArg*(T: type ValidIpAddress, p: TaintedString): T =
|
|
|
|
try:
|
|
|
|
result = ValidIpAddress.init(p)
|
|
|
|
except CatchableError:
|
|
|
|
raise newException(ConfigurationError, "Invalid IP address")
|
|
|
|
|
|
|
|
proc completeCmdArg*(T: type ValidIpAddress, val: TaintedString): seq[string] =
|
|
|
|
return @[]
|
|
|
|
|
|
|
|
func defaultListenAddress*(conf: WakuNodeConf): ValidIpAddress =
|
|
|
|
(static ValidIpAddress.init("0.0.0.0"))
|