mirror of
https://github.com/sigp/lighthouse.git
synced 2026-03-15 10:52:43 +00:00
## Issue Addressed NA ## Proposed Changes Adds an integration for keys generated via https://github.com/ethereum/eth2.0-deposit (In reality keys are *actually* generated here: https://github.com/ethereum/eth2.0-deposit-cli). ## Additional Info NA ## TODO - [x] Docs - [x] Tests Co-authored-by: Michael Sproul <michael@sigmaprime.io>
86 lines
3.1 KiB
Rust
86 lines
3.1 KiB
Rust
use clap::ArgMatches;
|
|
use clap_utils::{parse_optional, parse_path_with_default_in_home_dir};
|
|
use serde_derive::{Deserialize, Serialize};
|
|
use std::path::PathBuf;
|
|
|
|
pub const DEFAULT_HTTP_SERVER: &str = "http://localhost:5052/";
|
|
pub const DEFAULT_DATA_DIR: &str = ".lighthouse/validators";
|
|
pub const DEFAULT_SECRETS_DIR: &str = ".lighthouse/secrets";
|
|
/// Path to the slashing protection database within the datadir.
|
|
pub const SLASHING_PROTECTION_FILENAME: &str = "slashing_protection.sqlite";
|
|
|
|
/// Stores the core configuration for this validator instance.
|
|
#[derive(Clone, Serialize, Deserialize)]
|
|
pub struct Config {
|
|
/// The data directory, which stores all validator databases
|
|
pub data_dir: PathBuf,
|
|
/// The directory containing the passwords to unlock validator keystores.
|
|
pub secrets_dir: PathBuf,
|
|
/// The http endpoint of the beacon node API.
|
|
///
|
|
/// Should be similar to `http://localhost:8080`
|
|
pub http_server: String,
|
|
/// If true, the validator client will still poll for duties and produce blocks even if the
|
|
/// beacon node is not synced at startup.
|
|
pub allow_unsynced_beacon_node: bool,
|
|
/// If true, refuse to unlock a keypair that is guarded by a lockfile.
|
|
pub strict_lockfiles: bool,
|
|
/// If true, don't scan the validators dir for new keystores.
|
|
pub disable_auto_discover: bool,
|
|
}
|
|
|
|
impl Default for Config {
|
|
/// Build a new configuration from defaults.
|
|
fn default() -> Self {
|
|
let data_dir = dirs::home_dir()
|
|
.map(|home| home.join(DEFAULT_DATA_DIR))
|
|
.unwrap_or_else(|| PathBuf::from("."));
|
|
let secrets_dir = dirs::home_dir()
|
|
.map(|home| home.join(DEFAULT_SECRETS_DIR))
|
|
.unwrap_or_else(|| PathBuf::from("."));
|
|
Self {
|
|
data_dir,
|
|
secrets_dir,
|
|
http_server: DEFAULT_HTTP_SERVER.to_string(),
|
|
allow_unsynced_beacon_node: false,
|
|
strict_lockfiles: false,
|
|
disable_auto_discover: false,
|
|
}
|
|
}
|
|
}
|
|
|
|
impl Config {
|
|
/// Returns a `Default` implementation of `Self` with some parameters modified by the supplied
|
|
/// `cli_args`.
|
|
pub fn from_cli(cli_args: &ArgMatches) -> Result<Config, String> {
|
|
let mut config = Config::default();
|
|
|
|
config.data_dir = parse_path_with_default_in_home_dir(
|
|
cli_args,
|
|
"datadir",
|
|
PathBuf::from(".lighthouse").join("validators"),
|
|
)?;
|
|
|
|
if !config.data_dir.exists() {
|
|
return Err(format!(
|
|
"The directory for validator data (--datadir) does not exist: {:?}",
|
|
config.data_dir
|
|
));
|
|
}
|
|
|
|
if let Some(server) = parse_optional(cli_args, "server")? {
|
|
config.http_server = server;
|
|
}
|
|
|
|
config.allow_unsynced_beacon_node = cli_args.is_present("allow-unsynced");
|
|
config.strict_lockfiles = cli_args.is_present("strict-lockfiles");
|
|
config.disable_auto_discover = cli_args.is_present("disable-auto-discover");
|
|
|
|
if let Some(secrets_dir) = parse_optional(cli_args, "secrets-dir")? {
|
|
config.secrets_dir = secrets_dir;
|
|
}
|
|
|
|
Ok(config)
|
|
}
|
|
}
|