2017-04-14 03:29:00 -05:00
|
|
|
// Copyright 2017 The go-ethereum Authors
|
2017-04-12 09:27:23 -05:00
|
|
|
// This file is part of go-ethereum.
|
|
|
|
//
|
|
|
|
// go-ethereum is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// (at your option) any later version.
|
|
|
|
//
|
|
|
|
// go-ethereum is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU General Public License
|
|
|
|
// along with go-ethereum. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bufio"
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"os"
|
|
|
|
"reflect"
|
2023-08-31 12:37:17 -05:00
|
|
|
"runtime"
|
|
|
|
"strings"
|
2017-04-12 09:27:23 -05:00
|
|
|
"unicode"
|
|
|
|
|
2023-04-27 05:57:29 -05:00
|
|
|
"github.com/ethereum/go-ethereum/accounts"
|
2021-08-25 15:34:22 -05:00
|
|
|
"github.com/ethereum/go-ethereum/accounts/external"
|
|
|
|
"github.com/ethereum/go-ethereum/accounts/keystore"
|
|
|
|
"github.com/ethereum/go-ethereum/accounts/scwallet"
|
|
|
|
"github.com/ethereum/go-ethereum/accounts/usbwallet"
|
2017-04-12 09:27:23 -05:00
|
|
|
"github.com/ethereum/go-ethereum/cmd/utils"
|
2023-07-06 03:42:34 -05:00
|
|
|
"github.com/ethereum/go-ethereum/eth/catalyst"
|
2022-12-08 07:40:43 -06:00
|
|
|
"github.com/ethereum/go-ethereum/eth/downloader"
|
2021-02-05 06:51:15 -06:00
|
|
|
"github.com/ethereum/go-ethereum/eth/ethconfig"
|
2020-08-03 12:40:46 -05:00
|
|
|
"github.com/ethereum/go-ethereum/internal/ethapi"
|
2022-06-27 11:22:36 -05:00
|
|
|
"github.com/ethereum/go-ethereum/internal/flags"
|
2022-09-23 07:08:25 -05:00
|
|
|
"github.com/ethereum/go-ethereum/internal/version"
|
2021-06-30 05:57:32 -05:00
|
|
|
"github.com/ethereum/go-ethereum/log"
|
2021-01-18 07:36:05 -06:00
|
|
|
"github.com/ethereum/go-ethereum/metrics"
|
2017-04-12 09:27:23 -05:00
|
|
|
"github.com/ethereum/go-ethereum/node"
|
|
|
|
"github.com/ethereum/go-ethereum/params"
|
|
|
|
"github.com/naoina/toml"
|
2023-08-31 12:37:17 -05:00
|
|
|
"github.com/urfave/cli/v2"
|
2017-04-12 09:27:23 -05:00
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
2022-06-27 11:22:36 -05:00
|
|
|
dumpConfigCommand = &cli.Command{
|
|
|
|
Action: dumpConfig,
|
2017-04-12 09:27:23 -05:00
|
|
|
Name: "dumpconfig",
|
2023-02-21 01:35:04 -06:00
|
|
|
Usage: "Export configuration values in a TOML format",
|
|
|
|
ArgsUsage: "<dumpfile (optional)>",
|
2022-07-25 04:07:44 -05:00
|
|
|
Flags: flags.Merge(nodeFlags, rpcFlags),
|
2023-02-21 01:35:04 -06:00
|
|
|
Description: `Export configuration values in TOML format (to stdout by default).`,
|
2017-04-12 09:27:23 -05:00
|
|
|
}
|
|
|
|
|
2022-06-27 11:22:36 -05:00
|
|
|
configFileFlag = &cli.StringFlag{
|
|
|
|
Name: "config",
|
|
|
|
Usage: "TOML configuration file",
|
|
|
|
Category: flags.EthCategory,
|
2017-04-12 09:27:23 -05:00
|
|
|
}
|
|
|
|
)
|
|
|
|
|
|
|
|
// These settings ensure that TOML keys use the same names as Go struct fields.
|
|
|
|
var tomlSettings = toml.Config{
|
|
|
|
NormFieldName: func(rt reflect.Type, key string) string {
|
|
|
|
return key
|
|
|
|
},
|
|
|
|
FieldToKey: func(rt reflect.Type, field string) string {
|
|
|
|
return field
|
|
|
|
},
|
|
|
|
MissingField: func(rt reflect.Type, field string) error {
|
2021-06-30 05:57:32 -05:00
|
|
|
id := fmt.Sprintf("%s.%s", rt.String(), field)
|
|
|
|
if deprecated(id) {
|
|
|
|
log.Warn("Config field is deprecated and won't have an effect", "name", id)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
var link string
|
2017-04-12 09:27:23 -05:00
|
|
|
if unicode.IsUpper(rune(rt.Name()[0])) && rt.PkgPath() != "main" {
|
|
|
|
link = fmt.Sprintf(", see https://godoc.org/%s#%s for available fields", rt.PkgPath(), rt.Name())
|
|
|
|
}
|
|
|
|
return fmt.Errorf("field '%s' is not defined in %s%s", field, rt.String(), link)
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
type ethstatsConfig struct {
|
|
|
|
URL string `toml:",omitempty"`
|
|
|
|
}
|
|
|
|
|
|
|
|
type gethConfig struct {
|
2021-02-05 06:51:15 -06:00
|
|
|
Eth ethconfig.Config
|
2019-11-14 03:04:16 -06:00
|
|
|
Node node.Config
|
|
|
|
Ethstats ethstatsConfig
|
2021-01-18 07:36:05 -06:00
|
|
|
Metrics metrics.Config
|
2017-04-12 09:27:23 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
func loadConfig(file string, cfg *gethConfig) error {
|
|
|
|
f, err := os.Open(file)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer f.Close()
|
|
|
|
|
|
|
|
err = tomlSettings.NewDecoder(bufio.NewReader(f)).Decode(cfg)
|
|
|
|
// Add file name to errors that have a line number.
|
|
|
|
if _, ok := err.(*toml.LineError); ok {
|
|
|
|
err = errors.New(file + ", " + err.Error())
|
|
|
|
}
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
func defaultNodeConfig() node.Config {
|
2022-09-23 07:08:25 -05:00
|
|
|
git, _ := version.VCS()
|
2017-04-12 09:27:23 -05:00
|
|
|
cfg := node.DefaultConfig
|
|
|
|
cfg.Name = clientIdentifier
|
2022-09-23 07:08:25 -05:00
|
|
|
cfg.Version = params.VersionWithCommit(git.Commit, git.Date)
|
2020-01-28 03:37:08 -06:00
|
|
|
cfg.HTTPModules = append(cfg.HTTPModules, "eth")
|
|
|
|
cfg.WSModules = append(cfg.WSModules, "eth")
|
2017-04-12 09:27:23 -05:00
|
|
|
cfg.IPCPath = "geth.ipc"
|
|
|
|
return cfg
|
|
|
|
}
|
|
|
|
|
2023-04-27 05:57:29 -05:00
|
|
|
// loadBaseConfig loads the gethConfig based on the given command line
|
|
|
|
// parameters and config file.
|
|
|
|
func loadBaseConfig(ctx *cli.Context) gethConfig {
|
2017-04-12 09:27:23 -05:00
|
|
|
// Load defaults.
|
|
|
|
cfg := gethConfig{
|
2021-02-05 06:51:15 -06:00
|
|
|
Eth: ethconfig.Defaults,
|
2021-01-18 07:36:05 -06:00
|
|
|
Node: defaultNodeConfig(),
|
|
|
|
Metrics: metrics.DefaultConfig,
|
2017-04-12 09:27:23 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// Load config file.
|
2022-06-27 11:22:36 -05:00
|
|
|
if file := ctx.String(configFileFlag.Name); file != "" {
|
2017-04-12 09:27:23 -05:00
|
|
|
if err := loadConfig(file, &cfg); err != nil {
|
|
|
|
utils.Fatalf("%v", err)
|
|
|
|
}
|
|
|
|
}
|
2021-03-03 08:08:14 -06:00
|
|
|
|
2017-04-12 09:27:23 -05:00
|
|
|
// Apply flags.
|
|
|
|
utils.SetNodeConfig(ctx, &cfg.Node)
|
2023-04-27 05:57:29 -05:00
|
|
|
return cfg
|
|
|
|
}
|
|
|
|
|
|
|
|
// makeConfigNode loads geth configuration and creates a blank node instance.
|
|
|
|
func makeConfigNode(ctx *cli.Context) (*node.Node, gethConfig) {
|
|
|
|
cfg := loadBaseConfig(ctx)
|
2017-04-12 09:27:23 -05:00
|
|
|
stack, err := node.New(&cfg.Node)
|
|
|
|
if err != nil {
|
|
|
|
utils.Fatalf("Failed to create the protocol stack: %v", err)
|
|
|
|
}
|
2021-08-25 15:34:22 -05:00
|
|
|
// Node doesn't by default populate account manager backends
|
2023-04-27 05:57:29 -05:00
|
|
|
if err := setAccountManagerBackends(stack.Config(), stack.AccountManager(), stack.KeyStoreDir()); err != nil {
|
2021-08-25 15:34:22 -05:00
|
|
|
utils.Fatalf("Failed to set account manager backends: %v", err)
|
|
|
|
}
|
|
|
|
|
2017-04-12 09:27:23 -05:00
|
|
|
utils.SetEthConfig(ctx, stack, &cfg.Eth)
|
2022-06-27 11:22:36 -05:00
|
|
|
if ctx.IsSet(utils.EthStatsURLFlag.Name) {
|
|
|
|
cfg.Ethstats.URL = ctx.String(utils.EthStatsURLFlag.Name)
|
2017-04-12 09:27:23 -05:00
|
|
|
}
|
2021-01-18 07:36:05 -06:00
|
|
|
applyMetricConfig(ctx, &cfg)
|
|
|
|
|
2017-04-12 09:27:23 -05:00
|
|
|
return stack, cfg
|
|
|
|
}
|
|
|
|
|
2020-08-06 02:24:36 -05:00
|
|
|
// makeFullNode loads geth configuration and creates the Ethereum backend.
|
2020-08-03 12:40:46 -05:00
|
|
|
func makeFullNode(ctx *cli.Context) (*node.Node, ethapi.Backend) {
|
2017-04-12 09:27:23 -05:00
|
|
|
stack, cfg := makeConfigNode(ctx)
|
2023-04-26 10:17:37 -05:00
|
|
|
if ctx.IsSet(utils.OverrideCancun.Name) {
|
|
|
|
v := ctx.Uint64(utils.OverrideCancun.Name)
|
|
|
|
cfg.Eth.OverrideCancun = &v
|
2021-04-16 14:29:22 -05:00
|
|
|
}
|
2023-06-28 04:08:48 -05:00
|
|
|
if ctx.IsSet(utils.OverrideVerkle.Name) {
|
|
|
|
v := ctx.Uint64(utils.OverrideVerkle.Name)
|
|
|
|
cfg.Eth.OverrideVerkle = &v
|
|
|
|
}
|
2022-12-08 07:40:43 -06:00
|
|
|
backend, eth := utils.RegisterEthService(stack, &cfg.Eth)
|
2022-08-19 04:14:59 -05:00
|
|
|
|
2023-08-31 12:37:17 -05:00
|
|
|
// Create gauge with geth system and build information
|
|
|
|
if eth != nil { // The 'eth' backend may be nil in light mode
|
|
|
|
var protos []string
|
|
|
|
for _, p := range eth.Protocols() {
|
|
|
|
protos = append(protos, fmt.Sprintf("%v/%d", p.Name, p.Version))
|
|
|
|
}
|
|
|
|
metrics.NewRegisteredGaugeInfo("geth/info", nil).Update(metrics.GaugeInfoValue{
|
|
|
|
"arch": runtime.GOARCH,
|
|
|
|
"os": runtime.GOOS,
|
|
|
|
"version": cfg.Node.Version,
|
|
|
|
"eth_protocols": strings.Join(protos, ","),
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2022-08-19 04:14:59 -05:00
|
|
|
// Configure log filter RPC API.
|
|
|
|
filterSystem := utils.RegisterFilterAPI(stack, backend, &cfg.Eth)
|
|
|
|
|
|
|
|
// Configure GraphQL if requested.
|
2022-06-27 11:22:36 -05:00
|
|
|
if ctx.IsSet(utils.GraphQLEnabledFlag.Name) {
|
2022-08-19 04:14:59 -05:00
|
|
|
utils.RegisterGraphQLService(stack, backend, filterSystem, &cfg.Node)
|
2019-01-21 08:38:13 -06:00
|
|
|
}
|
2022-08-19 04:14:59 -05:00
|
|
|
|
2017-04-12 09:27:23 -05:00
|
|
|
// Add the Ethereum Stats daemon if requested.
|
|
|
|
if cfg.Ethstats.URL != "" {
|
2020-08-03 12:40:46 -05:00
|
|
|
utils.RegisterEthStatsService(stack, backend, cfg.Ethstats.URL)
|
2017-04-12 09:27:23 -05:00
|
|
|
}
|
2022-12-08 07:40:43 -06:00
|
|
|
|
|
|
|
// Configure full-sync tester service if requested
|
|
|
|
if ctx.IsSet(utils.SyncTargetFlag.Name) && cfg.Eth.SyncMode == downloader.FullSync {
|
|
|
|
utils.RegisterFullSyncTester(stack, eth, ctx.Path(utils.SyncTargetFlag.Name))
|
|
|
|
}
|
2023-07-06 03:42:34 -05:00
|
|
|
|
|
|
|
// Start the dev mode if requested, or launch the engine API for
|
|
|
|
// interacting with external consensus client.
|
|
|
|
if ctx.IsSet(utils.DeveloperFlag.Name) {
|
|
|
|
simBeacon, err := catalyst.NewSimulatedBeacon(ctx.Uint64(utils.DeveloperPeriodFlag.Name), eth)
|
|
|
|
if err != nil {
|
|
|
|
utils.Fatalf("failed to register dev mode catalyst service: %v", err)
|
|
|
|
}
|
|
|
|
catalyst.RegisterSimulatedBeaconAPIs(stack, simBeacon)
|
|
|
|
stack.RegisterLifecycle(simBeacon)
|
|
|
|
} else if cfg.Eth.SyncMode != downloader.LightSync {
|
2023-07-31 00:18:13 -05:00
|
|
|
err := catalyst.Register(stack, eth)
|
2023-07-06 03:42:34 -05:00
|
|
|
if err != nil {
|
|
|
|
utils.Fatalf("failed to register catalyst service: %v", err)
|
|
|
|
}
|
|
|
|
}
|
2020-08-03 12:40:46 -05:00
|
|
|
return stack, backend
|
2017-04-12 09:27:23 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
// dumpConfig is the dumpconfig command.
|
|
|
|
func dumpConfig(ctx *cli.Context) error {
|
|
|
|
_, cfg := makeConfigNode(ctx)
|
|
|
|
comment := ""
|
|
|
|
|
|
|
|
if cfg.Eth.Genesis != nil {
|
|
|
|
cfg.Eth.Genesis = nil
|
|
|
|
comment += "# Note: this config doesn't contain the genesis block.\n\n"
|
|
|
|
}
|
|
|
|
|
|
|
|
out, err := tomlSettings.Marshal(&cfg)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-01-07 02:56:50 -06:00
|
|
|
|
|
|
|
dump := os.Stdout
|
|
|
|
if ctx.NArg() > 0 {
|
|
|
|
dump, err = os.OpenFile(ctx.Args().Get(0), os.O_RDWR|os.O_CREATE|os.O_TRUNC, 0644)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer dump.Close()
|
|
|
|
}
|
|
|
|
dump.WriteString(comment)
|
|
|
|
dump.Write(out)
|
|
|
|
|
2017-04-12 09:27:23 -05:00
|
|
|
return nil
|
|
|
|
}
|
2021-01-18 07:36:05 -06:00
|
|
|
|
|
|
|
func applyMetricConfig(ctx *cli.Context, cfg *gethConfig) {
|
2022-06-27 11:22:36 -05:00
|
|
|
if ctx.IsSet(utils.MetricsEnabledFlag.Name) {
|
|
|
|
cfg.Metrics.Enabled = ctx.Bool(utils.MetricsEnabledFlag.Name)
|
2021-01-18 07:36:05 -06:00
|
|
|
}
|
2022-06-27 11:22:36 -05:00
|
|
|
if ctx.IsSet(utils.MetricsEnabledExpensiveFlag.Name) {
|
|
|
|
cfg.Metrics.EnabledExpensive = ctx.Bool(utils.MetricsEnabledExpensiveFlag.Name)
|
2021-01-18 07:36:05 -06:00
|
|
|
}
|
2022-06-27 11:22:36 -05:00
|
|
|
if ctx.IsSet(utils.MetricsHTTPFlag.Name) {
|
|
|
|
cfg.Metrics.HTTP = ctx.String(utils.MetricsHTTPFlag.Name)
|
2021-01-18 07:36:05 -06:00
|
|
|
}
|
2022-06-27 11:22:36 -05:00
|
|
|
if ctx.IsSet(utils.MetricsPortFlag.Name) {
|
|
|
|
cfg.Metrics.Port = ctx.Int(utils.MetricsPortFlag.Name)
|
2021-01-18 07:36:05 -06:00
|
|
|
}
|
2022-06-27 11:22:36 -05:00
|
|
|
if ctx.IsSet(utils.MetricsEnableInfluxDBFlag.Name) {
|
|
|
|
cfg.Metrics.EnableInfluxDB = ctx.Bool(utils.MetricsEnableInfluxDBFlag.Name)
|
2021-01-18 07:36:05 -06:00
|
|
|
}
|
2022-06-27 11:22:36 -05:00
|
|
|
if ctx.IsSet(utils.MetricsInfluxDBEndpointFlag.Name) {
|
|
|
|
cfg.Metrics.InfluxDBEndpoint = ctx.String(utils.MetricsInfluxDBEndpointFlag.Name)
|
2021-01-18 07:36:05 -06:00
|
|
|
}
|
2022-06-27 11:22:36 -05:00
|
|
|
if ctx.IsSet(utils.MetricsInfluxDBDatabaseFlag.Name) {
|
|
|
|
cfg.Metrics.InfluxDBDatabase = ctx.String(utils.MetricsInfluxDBDatabaseFlag.Name)
|
2021-01-18 07:36:05 -06:00
|
|
|
}
|
2022-06-27 11:22:36 -05:00
|
|
|
if ctx.IsSet(utils.MetricsInfluxDBUsernameFlag.Name) {
|
|
|
|
cfg.Metrics.InfluxDBUsername = ctx.String(utils.MetricsInfluxDBUsernameFlag.Name)
|
2021-01-18 07:36:05 -06:00
|
|
|
}
|
2022-06-27 11:22:36 -05:00
|
|
|
if ctx.IsSet(utils.MetricsInfluxDBPasswordFlag.Name) {
|
|
|
|
cfg.Metrics.InfluxDBPassword = ctx.String(utils.MetricsInfluxDBPasswordFlag.Name)
|
2021-01-18 07:36:05 -06:00
|
|
|
}
|
2022-06-27 11:22:36 -05:00
|
|
|
if ctx.IsSet(utils.MetricsInfluxDBTagsFlag.Name) {
|
|
|
|
cfg.Metrics.InfluxDBTags = ctx.String(utils.MetricsInfluxDBTagsFlag.Name)
|
2021-01-18 07:36:05 -06:00
|
|
|
}
|
2022-06-27 11:22:36 -05:00
|
|
|
if ctx.IsSet(utils.MetricsEnableInfluxDBV2Flag.Name) {
|
|
|
|
cfg.Metrics.EnableInfluxDBV2 = ctx.Bool(utils.MetricsEnableInfluxDBV2Flag.Name)
|
2021-08-17 11:40:14 -05:00
|
|
|
}
|
2022-06-27 11:22:36 -05:00
|
|
|
if ctx.IsSet(utils.MetricsInfluxDBTokenFlag.Name) {
|
|
|
|
cfg.Metrics.InfluxDBToken = ctx.String(utils.MetricsInfluxDBTokenFlag.Name)
|
2021-08-17 11:40:14 -05:00
|
|
|
}
|
2022-06-27 11:22:36 -05:00
|
|
|
if ctx.IsSet(utils.MetricsInfluxDBBucketFlag.Name) {
|
|
|
|
cfg.Metrics.InfluxDBBucket = ctx.String(utils.MetricsInfluxDBBucketFlag.Name)
|
2021-08-17 11:40:14 -05:00
|
|
|
}
|
2022-06-27 11:22:36 -05:00
|
|
|
if ctx.IsSet(utils.MetricsInfluxDBOrganizationFlag.Name) {
|
|
|
|
cfg.Metrics.InfluxDBOrganization = ctx.String(utils.MetricsInfluxDBOrganizationFlag.Name)
|
2021-08-17 11:40:14 -05:00
|
|
|
}
|
2021-01-18 07:36:05 -06:00
|
|
|
}
|
2021-06-30 05:57:32 -05:00
|
|
|
|
|
|
|
func deprecated(field string) bool {
|
2021-07-06 15:03:09 -05:00
|
|
|
switch field {
|
|
|
|
case "ethconfig.Config.EVMInterpreter":
|
|
|
|
return true
|
|
|
|
case "ethconfig.Config.EWASMInterpreter":
|
|
|
|
return true
|
cmd, core, eth, graphql, trie: no persisted clean trie cache file (#27525)
The clean trie cache is persisted periodically, therefore Geth can
quickly warmup the cache in next restart.
However it will reduce the robustness of system. The assumption is
held in Geth that if the parent trie node is present, then the entire
sub-trie associated with the parent are all prensent.
Imagine the scenario that Geth rewinds itself to a past block and
restart, but Geth finds the root node of "future state" in clean
cache then regard this state is present in disk, while is not in fact.
Another example is offline pruning tool. Whenever an offline pruning
is performed, the clean cache file has to be removed to aviod hitting
the root node of "deleted states" in clean cache.
All in all, compare with the minor performance gain, system robustness
is something we care more.
2023-07-04 02:21:06 -05:00
|
|
|
case "ethconfig.Config.TrieCleanCacheJournal":
|
|
|
|
return true
|
|
|
|
case "ethconfig.Config.TrieCleanCacheRejournal":
|
|
|
|
return true
|
2021-07-06 15:03:09 -05:00
|
|
|
default:
|
|
|
|
return false
|
|
|
|
}
|
2021-06-30 05:57:32 -05:00
|
|
|
}
|
2021-08-25 15:34:22 -05:00
|
|
|
|
2023-04-27 05:57:29 -05:00
|
|
|
func setAccountManagerBackends(conf *node.Config, am *accounts.Manager, keydir string) error {
|
2021-08-25 15:34:22 -05:00
|
|
|
scryptN := keystore.StandardScryptN
|
|
|
|
scryptP := keystore.StandardScryptP
|
|
|
|
if conf.UseLightweightKDF {
|
|
|
|
scryptN = keystore.LightScryptN
|
|
|
|
scryptP = keystore.LightScryptP
|
|
|
|
}
|
|
|
|
|
|
|
|
// Assemble the supported backends
|
|
|
|
if len(conf.ExternalSigner) > 0 {
|
|
|
|
log.Info("Using external signer", "url", conf.ExternalSigner)
|
2023-05-08 02:01:14 -05:00
|
|
|
if extBackend, err := external.NewExternalBackend(conf.ExternalSigner); err == nil {
|
|
|
|
am.AddBackend(extBackend)
|
2021-08-25 15:34:22 -05:00
|
|
|
return nil
|
|
|
|
} else {
|
|
|
|
return fmt.Errorf("error connecting to external signer: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// For now, we're using EITHER external signer OR local signers.
|
|
|
|
// If/when we implement some form of lockfile for USB and keystore wallets,
|
|
|
|
// we can have both, but it's very confusing for the user to see the same
|
|
|
|
// accounts in both externally and locally, plus very racey.
|
|
|
|
am.AddBackend(keystore.NewKeyStore(keydir, scryptN, scryptP))
|
|
|
|
if conf.USB {
|
|
|
|
// Start a USB hub for Ledger hardware wallets
|
|
|
|
if ledgerhub, err := usbwallet.NewLedgerHub(); err != nil {
|
|
|
|
log.Warn(fmt.Sprintf("Failed to start Ledger hub, disabling: %v", err))
|
|
|
|
} else {
|
|
|
|
am.AddBackend(ledgerhub)
|
|
|
|
}
|
|
|
|
// Start a USB hub for Trezor hardware wallets (HID version)
|
|
|
|
if trezorhub, err := usbwallet.NewTrezorHubWithHID(); err != nil {
|
|
|
|
log.Warn(fmt.Sprintf("Failed to start HID Trezor hub, disabling: %v", err))
|
|
|
|
} else {
|
|
|
|
am.AddBackend(trezorhub)
|
|
|
|
}
|
|
|
|
// Start a USB hub for Trezor hardware wallets (WebUSB version)
|
|
|
|
if trezorhub, err := usbwallet.NewTrezorHubWithWebUSB(); err != nil {
|
|
|
|
log.Warn(fmt.Sprintf("Failed to start WebUSB Trezor hub, disabling: %v", err))
|
|
|
|
} else {
|
|
|
|
am.AddBackend(trezorhub)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if len(conf.SmartCardDaemonPath) > 0 {
|
|
|
|
// Start a smart card hub
|
|
|
|
if schub, err := scwallet.NewHub(conf.SmartCardDaemonPath, scwallet.Scheme, keydir); err != nil {
|
|
|
|
log.Warn(fmt.Sprintf("Failed to start smart card hub, disabling: %v", err))
|
|
|
|
} else {
|
|
|
|
am.AddBackend(schub)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|