-
Notifications
You must be signed in to change notification settings - Fork 837
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Feature request allow me to initialize the p2p private key file with new flag #7181 #7191
base: unstable
Are you sure you want to change the base?
Changes from all commits
f19b012
5cbca3d
7cbc48b
c8cefbf
a779673
7bffa2d
cd9df13
7d26b4e
8e5168a
6f6c619
c30b19b
70e36e8
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -44,6 +44,9 @@ use types::{ | |
}; | ||
use types::{ChainSpec, ForkName}; | ||
use utils::{build_transport, strip_peer_id, Context as ServiceContext}; | ||
use clap::ArgMatches; | ||
use super::utils; | ||
use crate::NetworkConfig; | ||
|
||
pub mod api_types; | ||
mod gossip_cache; | ||
|
@@ -178,8 +181,9 @@ impl<E: EthSpec> Network<E> { | |
let config = ctx.config.clone(); | ||
trace!("Libp2p Service starting"); | ||
// initialise the node's ID | ||
let local_keypair = utils::load_private_key(&config); | ||
|
||
pub fn initialize_network(config: NetworkConfig, cli_args: &ArgMatches) { | ||
let local_keypair = utils::load_private_key(&config, cli_args); | ||
} | ||
Comment on lines
+184
to
+186
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. This seems out of place, you don't have access to cli_args here. You should pass CLI data through the network config |
||
// Trusted peers will also be marked as explicit in GossipSub. | ||
// Cfr. https://github.com/libp2p/specs/blob/master/pubsub/gossipsub/gossipsub-v1.1.md#explicit-peering-agreements | ||
let trusted_peers: Vec<PeerId> = config | ||
|
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -20,6 +20,10 @@ use tracing::{debug, warn}; | |
use types::{ | ||
ChainSpec, DataColumnSubnetId, EnrForkId, EthSpec, ForkContext, SubnetId, SyncSubnetId, | ||
}; | ||
use clap::ArgMatches; | ||
use tracing::{error, debug, info} | ||
use std::path::PathBuf; | ||
use std::fs; | ||
|
||
pub const NETWORK_KEY_FILENAME: &str = "key"; | ||
/// The filename to store our local metadata. | ||
|
@@ -107,43 +111,28 @@ fn keypair_from_bytes(mut bytes: Vec<u8>) -> Result<Keypair, String> { | |
/// generated and is then saved to disk. | ||
/// | ||
/// Currently only secp256k1 keys are allowed, as these are the only keys supported by discv5. | ||
pub fn load_private_key(config: &NetworkConfig) -> Keypair { | ||
// check for key from disk | ||
let network_key_f = config.network_dir.join(NETWORK_KEY_FILENAME); | ||
if let Ok(mut network_key_file) = File::open(network_key_f.clone()) { | ||
let mut key_bytes: Vec<u8> = Vec::with_capacity(36); | ||
match network_key_file.read_to_end(&mut key_bytes) { | ||
Err(_) => debug!("Could not read network key file"), | ||
Ok(_) => { | ||
// only accept secp256k1 keys for now | ||
if let Ok(secret_key) = secp256k1::SecretKey::try_from_bytes(&mut key_bytes) { | ||
let kp: secp256k1::Keypair = secret_key.into(); | ||
debug!("Loaded network key from disk."); | ||
return kp.into(); | ||
} else { | ||
debug!("Network key file is not a valid secp256k1 key"); | ||
|
||
pub fn load_private_key(config: &NetworkConfig, cli_args: &ArgMatches) -> Keypair { | ||
if let Some(custom_key_path) = cli_args.get_one::<String>("p2p-priv-key") { | ||
let path = PathBuf::from(custom_key_path); | ||
match fs::read_to_string(&path) { | ||
Ok(key_hex) => match keypair_from_hex(key_hex.trim()) { | ||
Ok(keypair) => { | ||
debug!("Loaded custom p2p key from file: {:?}", path); | ||
return keypair; | ||
} | ||
Err(e) => { | ||
error!("Failed to decode custom p2p key from hex: {}", e); | ||
} | ||
}, | ||
Err(e) => { | ||
error!("Failed to read custom p2p key file {:?}: {}", path, e); | ||
} | ||
} | ||
} | ||
|
||
// if a key could not be loaded from disk, generate a new one and save it | ||
let local_private_key = secp256k1::Keypair::generate(); | ||
let _ = std::fs::create_dir_all(&config.network_dir); | ||
match File::create(network_key_f.clone()) | ||
.and_then(|mut f| f.write_all(&local_private_key.secret().to_bytes())) | ||
{ | ||
Ok(_) => { | ||
debug!("New network key generated and written to disk"); | ||
} | ||
Err(e) => { | ||
warn!( | ||
"Could not write node key to file: {:?}. error: {}", | ||
network_key_f, e | ||
); | ||
} | ||
} | ||
local_private_key.into() | ||
let key_path = config.network_dir.join("key"); | ||
load_or_create_keypair(key_path) | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. It looks like the implementation of |
||
} | ||
|
||
/// Generate authenticated XX Noise config from identity keys | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Un-intended change?