mirror of
https://github.com/OffchainLabs/prysm.git
synced 2026-01-09 15:37:56 -05:00
#### This PR sets the foundation for the new logging features. --- The goal of this big PR is the following: 1. Adding a log.go file to every package: [_commit_](54f6396d4c) - Writing a bash script that adds the log.go file to every package that imports logrus, except the excluded packages, configured at the top of the bash script. - the log.go file creates a log variable and sets a field called `package` to the full path of that package. - I have tried to fix every error/problem that came from mass generation of this file. (duplicate declarations, different prefix names, etc...) - some packages had the log.go file from before, and had some helper functions in there as well. I've moved all of them to a `log_helpers.go` file within each package. 2. Create a CI rule which verifies that: [_commit_](b799c3a0ef) - every package which imports logrus, also has a log.go file, except the excluded packages. - the `package` field of each log.go variable, has the correct path. (to detect when we move a package or change it's name) - I pushed a commit with a manually changed log.go file to trigger the ci check failure and it worked. 3. Alter the logging system to read the prefix from this `package` field for every log while outputing: [_commit_](b0c7f1146c) - some packages have/want/need a different log prefix than their package name (like `kv`). This can be solved by keeping a map of package paths to prefix names somewhere. --- **Some notes:** - Please review everything carefully. - I created the `prefixReplacement` map and populated the data that I deemed necessary. Please check it and complain if something doesn't make sense or is missing. I attached at the bottom, the list of all the packages that used to use a different name than their package name as their prefix. - I have chosen to mark some packages to be excluded from this whole process. They will either not log anything, or log without a prefix, or log using their previously defined prefix. See the list of exclusions in the bottom. - I fixed all the tests that failed because of this change. These were failing because they were expecting the old prefix to be in the generated logs. I have changed those to expect the new `package` field instead. This might not be a great solution. Ideally we might want to remove this from the tests so they only test for relevant fields in the logs. but this is a problem for another day. - Please run the node with this config, and mention if you see something weird in the logs. (use different verbosities) - The CI workflow uses a script that basically runs the `hack/gen-logs.sh` and checks that the git diff is zero. that script is `hack/check-logs.sh`. This means that if one runs this script locally, it will not actually _check_ anything, rather than just regenerate the log.go files and fix any mistake. This might be confusing. Please suggest solutions if you think it's a problem. --- **A list of packages that used a different prefix than their package names for their logs:** - beacon-chain/cache/depositsnapshot/ package depositsnapshot, prefix "cache" - beacon-chain/core/transition/log.go — package transition, prefix "state" - beacon-chain/db/kv/log.go — package kv, prefix "db" - beacon-chain/db/slasherkv/log.go — package slasherkv, prefix "slasherdb" - beacon-chain/db/pruner/pruner.go — package pruner, prefix "db-pruner" - beacon-chain/light-client/log.go — package light_client, prefix "light-client" - beacon-chain/operations/attestations/log.go — package attestations, prefix "pool/attestations" - beacon-chain/operations/slashings/log.go — package slashings, prefix "pool/slashings" - beacon-chain/rpc/core/log.go — package core, prefix "rpc/core" - beacon-chain/rpc/eth/beacon/log.go — package beacon, prefix "rpc/beaconv1" - beacon-chain/rpc/eth/validator/log.go — package validator, prefix "beacon-api" - beacon-chain/rpc/prysm/v1alpha1/beacon/log.go — package beacon, prefix "rpc" - beacon-chain/rpc/prysm/v1alpha1/validator/log.go — package validator, prefix "rpc/validator" - beacon-chain/state/stategen/log.go — package stategen, prefix "state-gen" - beacon-chain/sync/checkpoint/log.go — package checkpoint, prefix "checkpoint-sync" - beacon-chain/sync/initial-sync/log.go — package initialsync, prefix "initial-sync" - cmd/prysmctl/p2p/log.go — package p2p, prefix "prysmctl-p2p" - config/features/log.go -- package features, prefix "flags" - io/file/log.go — package file, prefix "fileutil" - proto/prysm/v1alpha1/log.go — package eth, prefix "protobuf" - validator/client/beacon-api/log.go — package beacon_api, prefix "beacon-api" - validator/db/kv/log.go — package kv, prefix "db" - validator/db/filesystem/db.go — package filesystem, prefix "db" - validator/keymanager/derived/log.go — package derived, prefix "derived-keymanager" - validator/keymanager/local/log.go — package local, prefix "local-keymanager" - validator/keymanager/remote-web3signer/log.go — package remote_web3signer, prefix "remote-keymanager" - validator/keymanager/remote-web3signer/internal/log.go — package internal, prefix "remote-web3signer- internal" - beacon-chain/forkchoice/doubly... prefix is "forkchoice-doublylinkedtree" **List of excluded directories (their subdirectories are also excluded):** ``` EXCLUDED_PATH_PREFIXES=( "testing" "validator/client/testutil" "beacon-chain/p2p/testing" "beacon-chain/rpc/eth/config" "beacon-chain/rpc/prysm/v1alpha1/debug" "tools" "runtime" "monitoring" "io" "cmd" ".well-known" "changelog" "hack" "specrefs" "third_party" "bazel-out" "bazel-bin" "bazel-prysm" "bazel-testlogs" "build" ".github" ".jj" ".idea" ".vscode" ) ```
444 lines
16 KiB
Go
444 lines
16 KiB
Go
/*
|
|
Package features defines which features are enabled for runtime
|
|
in order to selectively enable certain features to maintain a stable runtime.
|
|
|
|
The process for implementing new features using this package is as follows:
|
|
1. Add a new CMD flag in flags.go, and place it in the proper list(s) var for its client.
|
|
2. Add a condition for the flag in the proper Configure function(s) below.
|
|
3. Place any "new" behavior in the `if flagEnabled` statement.
|
|
4. Place any "previous" behavior in the `else` statement.
|
|
5. Ensure any tests using the new feature fail if the flag isn't enabled.
|
|
5a. Use the following to enable your flag for tests:
|
|
cfg := &featureconfig.Flags{
|
|
VerifyAttestationSigs: true,
|
|
}
|
|
resetCfg := featureconfig.InitWithReset(cfg)
|
|
defer resetCfg()
|
|
6. Add the string for the flags that should be running within E2E to E2EValidatorFlags
|
|
and E2EBeaconChainFlags.
|
|
*/
|
|
package features
|
|
|
|
import (
|
|
"fmt"
|
|
"strings"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/OffchainLabs/prysm/v7/cmd"
|
|
"github.com/OffchainLabs/prysm/v7/config/params"
|
|
"github.com/OffchainLabs/prysm/v7/encoding/bytesutil"
|
|
"github.com/urfave/cli/v2"
|
|
)
|
|
|
|
const enabledFeatureFlag = "Enabled feature flag"
|
|
const disabledFeatureFlag = "Disabled feature flag"
|
|
|
|
// Flags is a struct to represent which features the client will perform on runtime.
|
|
type Flags struct {
|
|
// Feature related flags.
|
|
WriteSSZStateTransitions bool // WriteSSZStateTransitions to tmp directory.
|
|
EnablePeerScorer bool // EnablePeerScorer enables experimental peer scoring in p2p.
|
|
EnableLightClient bool // EnableLightClient enables light client APIs.
|
|
EnableQUIC bool // EnableQUIC specifies whether to enable QUIC transport for libp2p.
|
|
WriteWalletPasswordOnWebOnboarding bool // WriteWalletPasswordOnWebOnboarding writes the password to disk after Prysm web signup.
|
|
EnableDoppelGanger bool // EnableDoppelGanger enables doppelganger protection on startup for the validator.
|
|
EnableHistoricalSpaceRepresentation bool // EnableHistoricalSpaceRepresentation enables the saving of registry validators in separate buckets to save space
|
|
EnableBeaconRESTApi bool // EnableBeaconRESTApi enables experimental usage of the beacon REST API by the validator when querying a beacon node
|
|
EnableExperimentalAttestationPool bool // EnableExperimentalAttestationPool enables an experimental attestation pool design.
|
|
DisableDutiesV2 bool // DisableDutiesV2 sets validator client to use the get Duties endpoint
|
|
EnableWeb bool // EnableWeb enables the webui on the validator client
|
|
EnableStateDiff bool // EnableStateDiff enables the experimental state diff feature for the beacon node.
|
|
|
|
// Logging related toggles.
|
|
DisableGRPCConnectionLogs bool // Disables logging when a new grpc client has connected.
|
|
EnableFullSSZDataLogging bool // Enables logging for full ssz data on rejected gossip messages
|
|
|
|
// Slasher toggles.
|
|
DisableBroadcastSlashings bool // DisableBroadcastSlashings disables p2p broadcasting of proposer and attester slashings.
|
|
|
|
// Bug fixes related flags.
|
|
AttestTimely bool // AttestTimely fixes #8185. It is gated behind a flag to ensure beacon node's fix can safely roll out first. We'll invert this in v1.1.0.
|
|
|
|
EnableSlashingProtectionPruning bool // Enable slashing protection pruning for the validator client.
|
|
EnableMinimalSlashingProtection bool // Enable minimal slashing protection database for the validator client.
|
|
|
|
SaveFullExecutionPayloads bool // Save full beacon blocks with execution payloads in the database.
|
|
EnableStartOptimistic bool // EnableStartOptimistic treats every block as optimistic at startup.
|
|
|
|
DisableResourceManager bool // Disables running the node with libp2p's resource manager.
|
|
DisableStakinContractCheck bool // Disables check for deposit contract when proposing blocks
|
|
IgnoreUnviableAttestations bool // Ignore attestations whose target state is not viable (avoids lagging-node DoS).
|
|
|
|
EnableVerboseSigVerification bool // EnableVerboseSigVerification specifies whether to verify individual signature if batch verification fails
|
|
|
|
PrepareAllPayloads bool // PrepareAllPayloads informs the engine to prepare a block on every slot.
|
|
// BlobSaveFsync requires blob saving to block on fsync to ensure blobs are durably persisted before passing DA.
|
|
BlobSaveFsync bool
|
|
|
|
SaveInvalidBlock bool // SaveInvalidBlock saves invalid block to temp.
|
|
SaveInvalidBlob bool // SaveInvalidBlob saves invalid blob to temp.
|
|
|
|
EnableDiscoveryReboot bool // EnableDiscoveryReboot allows the node to have its local listener to be rebooted in the event of discovery issues.
|
|
|
|
// KeystoreImportDebounceInterval specifies the time duration the validator waits to reload new keys if they have
|
|
// changed on disk. This feature is for advanced use cases only.
|
|
KeystoreImportDebounceInterval time.Duration
|
|
|
|
// AggregateIntervals specifies the time durations at which we aggregate attestations preparing for forkchoice.
|
|
AggregateIntervals [3]time.Duration
|
|
|
|
// Feature related flags (alignment forced in the end)
|
|
ForceHead string // ForceHead forces the head block to be a specific block root, the last head block, or the last finalized block.
|
|
BlacklistedRoots map[[32]byte]struct{} // BlacklistedRoots is a list of roots that are blacklisted from processing.
|
|
}
|
|
|
|
var featureConfig *Flags
|
|
var featureConfigLock sync.RWMutex
|
|
|
|
// Get retrieves feature config.
|
|
func Get() *Flags {
|
|
featureConfigLock.RLock()
|
|
defer featureConfigLock.RUnlock()
|
|
|
|
if featureConfig == nil {
|
|
return &Flags{}
|
|
}
|
|
return featureConfig
|
|
}
|
|
|
|
// Init sets the global config equal to the config that is passed in.
|
|
func Init(c *Flags) {
|
|
featureConfigLock.Lock()
|
|
defer featureConfigLock.Unlock()
|
|
|
|
featureConfig = c
|
|
}
|
|
|
|
// InitWithReset sets the global config and returns function that is used to reset configuration.
|
|
func InitWithReset(c *Flags) func() {
|
|
var prevConfig Flags
|
|
if featureConfig != nil {
|
|
prevConfig = *featureConfig
|
|
} else {
|
|
prevConfig = Flags{}
|
|
}
|
|
resetFunc := func() {
|
|
Init(&prevConfig)
|
|
}
|
|
Init(c)
|
|
return resetFunc
|
|
}
|
|
|
|
// configureTestnet sets the config according to specified testnet flag
|
|
func configureTestnet(ctx *cli.Context) error {
|
|
if ctx.Bool(SepoliaTestnet.Name) {
|
|
log.Info("Running on the Sepolia Beacon Chain Testnet")
|
|
if err := params.SetActive(params.SepoliaConfig().Copy()); err != nil {
|
|
return err
|
|
}
|
|
applySepoliaFeatureFlags(ctx)
|
|
params.UseSepoliaNetworkConfig()
|
|
} else if ctx.Bool(HoleskyTestnet.Name) {
|
|
log.Info("Running on the Holesky Beacon Chain Testnet")
|
|
if err := params.SetActive(params.HoleskyConfig().Copy()); err != nil {
|
|
return err
|
|
}
|
|
applyHoleskyFeatureFlags(ctx)
|
|
params.UseHoleskyNetworkConfig()
|
|
} else if ctx.Bool(HoodiTestnet.Name) {
|
|
log.Info("Running on the Hoodi Beacon Chain Testnet")
|
|
if err := params.SetActive(params.HoodiConfig().Copy()); err != nil {
|
|
return err
|
|
}
|
|
params.UseHoodiNetworkConfig()
|
|
} else {
|
|
if ctx.IsSet(cmd.ChainConfigFileFlag.Name) {
|
|
log.Warning("Running on custom Ethereum network specified in a chain configuration YAML file")
|
|
params.UseCustomNetworkConfig()
|
|
} else {
|
|
log.Info("Running on Ethereum Mainnet")
|
|
}
|
|
if err := params.SetActive(params.MainnetConfig()); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Insert feature flags within the function to be enabled for Sepolia testnet.
|
|
func applySepoliaFeatureFlags(_ *cli.Context) {
|
|
}
|
|
|
|
// Insert feature flags within the function to be enabled for Holesky testnet.
|
|
func applyHoleskyFeatureFlags(_ *cli.Context) {
|
|
}
|
|
|
|
// ConfigureBeaconChain sets the global config based
|
|
// on what flags are enabled for the beacon-chain client.
|
|
func ConfigureBeaconChain(ctx *cli.Context) error {
|
|
warnDeprecationUpcoming(ctx)
|
|
complainOnDeprecatedFlags(ctx)
|
|
cfg := &Flags{}
|
|
if ctx.Bool(devModeFlag.Name) {
|
|
enableDevModeFlags(ctx)
|
|
}
|
|
if err := configureTestnet(ctx); err != nil {
|
|
return err
|
|
}
|
|
|
|
if ctx.Bool(writeSSZStateTransitionsFlag.Name) {
|
|
logEnabled(writeSSZStateTransitionsFlag)
|
|
cfg.WriteSSZStateTransitions = true
|
|
}
|
|
|
|
if ctx.Bool(saveInvalidBlockTempFlag.Name) {
|
|
logEnabled(saveInvalidBlockTempFlag)
|
|
cfg.SaveInvalidBlock = true
|
|
}
|
|
|
|
if ctx.Bool(saveInvalidBlobTempFlag.Name) {
|
|
logEnabled(saveInvalidBlobTempFlag)
|
|
cfg.SaveInvalidBlob = true
|
|
}
|
|
|
|
if ctx.IsSet(disableGRPCConnectionLogging.Name) {
|
|
logDisabled(disableGRPCConnectionLogging)
|
|
cfg.DisableGRPCConnectionLogs = true
|
|
}
|
|
|
|
cfg.EnablePeerScorer = true
|
|
if ctx.Bool(disablePeerScorer.Name) {
|
|
logDisabled(disablePeerScorer)
|
|
cfg.EnablePeerScorer = false
|
|
}
|
|
if ctx.Bool(disableBroadcastSlashingFlag.Name) {
|
|
logDisabled(disableBroadcastSlashingFlag)
|
|
cfg.DisableBroadcastSlashings = true
|
|
}
|
|
if ctx.Bool(enableHistoricalSpaceRepresentation.Name) {
|
|
log.WithField(enableHistoricalSpaceRepresentation.Name, enableHistoricalSpaceRepresentation.Usage).Warn(enabledFeatureFlag)
|
|
cfg.EnableHistoricalSpaceRepresentation = true
|
|
}
|
|
if ctx.Bool(disableStakinContractCheck.Name) {
|
|
logEnabled(disableStakinContractCheck)
|
|
cfg.DisableStakinContractCheck = true
|
|
}
|
|
if ctx.Bool(SaveFullExecutionPayloads.Name) {
|
|
logEnabled(SaveFullExecutionPayloads)
|
|
cfg.SaveFullExecutionPayloads = true
|
|
}
|
|
if ctx.Bool(enableStartupOptimistic.Name) {
|
|
logEnabled(enableStartupOptimistic)
|
|
cfg.EnableStartOptimistic = true
|
|
}
|
|
if ctx.IsSet(enableFullSSZDataLogging.Name) {
|
|
logEnabled(enableFullSSZDataLogging)
|
|
cfg.EnableFullSSZDataLogging = true
|
|
}
|
|
cfg.EnableVerboseSigVerification = true
|
|
if ctx.IsSet(disableVerboseSigVerification.Name) {
|
|
logEnabled(disableVerboseSigVerification)
|
|
cfg.EnableVerboseSigVerification = false
|
|
}
|
|
if ctx.IsSet(prepareAllPayloads.Name) {
|
|
logEnabled(prepareAllPayloads)
|
|
cfg.PrepareAllPayloads = true
|
|
}
|
|
if ctx.IsSet(disableResourceManager.Name) {
|
|
logEnabled(disableResourceManager)
|
|
cfg.DisableResourceManager = true
|
|
}
|
|
if ctx.IsSet(EnableLightClient.Name) {
|
|
logEnabled(EnableLightClient)
|
|
cfg.EnableLightClient = true
|
|
}
|
|
if ctx.IsSet(BlobSaveFsync.Name) {
|
|
logEnabled(BlobSaveFsync)
|
|
cfg.BlobSaveFsync = true
|
|
}
|
|
cfg.EnableQUIC = true
|
|
if ctx.IsSet(DisableQUIC.Name) {
|
|
logDisabled(DisableQUIC)
|
|
cfg.EnableQUIC = false
|
|
}
|
|
if ctx.IsSet(EnableDiscoveryReboot.Name) {
|
|
logEnabled(EnableDiscoveryReboot)
|
|
cfg.EnableDiscoveryReboot = true
|
|
}
|
|
if ctx.IsSet(enableExperimentalAttestationPool.Name) {
|
|
logEnabled(enableExperimentalAttestationPool)
|
|
cfg.EnableExperimentalAttestationPool = true
|
|
}
|
|
if ctx.IsSet(forceHeadFlag.Name) {
|
|
logEnabled(forceHeadFlag)
|
|
cfg.ForceHead = ctx.String(forceHeadFlag.Name)
|
|
}
|
|
if ctx.IsSet(blacklistRoots.Name) {
|
|
logEnabled(blacklistRoots)
|
|
cfg.BlacklistedRoots = parseBlacklistedRoots(ctx.StringSlice(blacklistRoots.Name))
|
|
}
|
|
|
|
cfg.IgnoreUnviableAttestations = false
|
|
if ctx.IsSet(ignoreUnviableAttestations.Name) && ctx.Bool(ignoreUnviableAttestations.Name) {
|
|
logEnabled(ignoreUnviableAttestations)
|
|
cfg.IgnoreUnviableAttestations = true
|
|
}
|
|
|
|
if ctx.IsSet(EnableStateDiff.Name) {
|
|
logEnabled(EnableStateDiff)
|
|
cfg.EnableStateDiff = true
|
|
|
|
if ctx.IsSet(enableHistoricalSpaceRepresentation.Name) {
|
|
log.Warn("--enable-state-diff is enabled, ignoring --enable-historical-space-representation flag.")
|
|
cfg.EnableHistoricalSpaceRepresentation = false
|
|
}
|
|
}
|
|
|
|
cfg.AggregateIntervals = [3]time.Duration{aggregateFirstInterval.Value, aggregateSecondInterval.Value, aggregateThirdInterval.Value}
|
|
Init(cfg)
|
|
return nil
|
|
}
|
|
|
|
func parseBlacklistedRoots(blacklistedRoots []string) map[[32]byte]struct{} {
|
|
roots := make(map[[32]byte]struct{})
|
|
for _, root := range blacklistedRoots {
|
|
r, err := bytesutil.DecodeHexWithLength(root, 32)
|
|
if err != nil {
|
|
log.WithError(err).WithField("root", root).Warn("Failed to parse blacklisted root")
|
|
continue
|
|
}
|
|
roots[[32]byte(r)] = struct{}{}
|
|
}
|
|
return roots
|
|
}
|
|
|
|
// ConfigureValidator sets the global config based
|
|
// on what flags are enabled for the validator client.
|
|
func ConfigureValidator(ctx *cli.Context) error {
|
|
complainOnDeprecatedFlags(ctx)
|
|
cfg := &Flags{}
|
|
if err := configureTestnet(ctx); err != nil {
|
|
return err
|
|
}
|
|
if ctx.Bool(writeWalletPasswordOnWebOnboarding.Name) {
|
|
logEnabled(writeWalletPasswordOnWebOnboarding)
|
|
cfg.WriteWalletPasswordOnWebOnboarding = true
|
|
}
|
|
cfg.AttestTimely = true
|
|
if ctx.Bool(disableAttestTimely.Name) {
|
|
logEnabled(disableAttestTimely)
|
|
cfg.AttestTimely = false
|
|
}
|
|
if ctx.Bool(enableSlashingProtectionPruning.Name) {
|
|
logEnabled(enableSlashingProtectionPruning)
|
|
cfg.EnableSlashingProtectionPruning = true
|
|
}
|
|
if ctx.Bool(EnableMinimalSlashingProtection.Name) {
|
|
logEnabled(EnableMinimalSlashingProtection)
|
|
cfg.EnableMinimalSlashingProtection = true
|
|
}
|
|
if ctx.Bool(enableDoppelGangerProtection.Name) {
|
|
logEnabled(enableDoppelGangerProtection)
|
|
cfg.EnableDoppelGanger = true
|
|
}
|
|
if ctx.Bool(EnableBeaconRESTApi.Name) {
|
|
logEnabled(EnableBeaconRESTApi)
|
|
cfg.EnableBeaconRESTApi = true
|
|
}
|
|
if ctx.Bool(DisableDutiesV2.Name) {
|
|
logEnabled(DisableDutiesV2)
|
|
cfg.DisableDutiesV2 = true
|
|
}
|
|
if ctx.Bool(EnableWebFlag.Name) {
|
|
logEnabled(EnableWebFlag)
|
|
cfg.EnableWeb = true
|
|
}
|
|
|
|
cfg.KeystoreImportDebounceInterval = ctx.Duration(dynamicKeyReloadDebounceInterval.Name)
|
|
Init(cfg)
|
|
return nil
|
|
}
|
|
|
|
// enableDevModeFlags switches development mode features on.
|
|
func enableDevModeFlags(ctx *cli.Context) {
|
|
log.Warn("Enabling development mode flags")
|
|
for _, f := range devModeFlags {
|
|
log.WithField("flag", f.Names()[0]).Debug("Enabling development mode flag")
|
|
if !ctx.IsSet(f.Names()[0]) {
|
|
if err := ctx.Set(f.Names()[0], "true"); err != nil {
|
|
log.WithError(err).Debug("Error enabling development mode flag")
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
func complainOnDeprecatedFlags(ctx *cli.Context) {
|
|
for _, f := range deprecatedFlags {
|
|
if ctx.IsSet(f.Names()[0]) {
|
|
log.Errorf("%s is deprecated and has no effect. Do not use this flag, it will be deleted soon.", f.Names()[0])
|
|
}
|
|
}
|
|
}
|
|
|
|
var upcomingDeprecationExtra = map[string]string{
|
|
enableHistoricalSpaceRepresentation.Name: "The node needs to be resynced after flag removal.",
|
|
}
|
|
|
|
func warnDeprecationUpcoming(ctx *cli.Context) {
|
|
for _, f := range upcomingDeprecation {
|
|
if ctx.IsSet(f.Names()[0]) {
|
|
extra := "Please remove this flag from your configuration."
|
|
if special, ok := upcomingDeprecationExtra[f.Names()[0]]; ok {
|
|
extra += " " + special
|
|
}
|
|
log.Warnf("--%s is pending deprecation and will be removed in the next release. %s", f.Names()[0], extra)
|
|
}
|
|
}
|
|
}
|
|
|
|
func logEnabled(flag cli.DocGenerationFlag) {
|
|
var name string
|
|
if names := flag.Names(); len(names) > 0 {
|
|
name = names[0]
|
|
}
|
|
log.WithField(name, flag.GetUsage()).Warn(enabledFeatureFlag)
|
|
}
|
|
|
|
func logDisabled(flag cli.DocGenerationFlag) {
|
|
var name string
|
|
if names := flag.Names(); len(names) > 0 {
|
|
name = names[0]
|
|
}
|
|
log.WithField(name, flag.GetUsage()).Warn(disabledFeatureFlag)
|
|
}
|
|
|
|
// ValidateNetworkFlags validates provided flags and
|
|
// prevents beacon node or validator to start
|
|
// if more than one network flag is provided
|
|
func ValidateNetworkFlags(ctx *cli.Context) error {
|
|
networkFlagsCount := 0
|
|
for _, flag := range NetworkFlags {
|
|
if ctx.IsSet(flag.Names()[0]) {
|
|
networkFlagsCount++
|
|
if networkFlagsCount > 1 {
|
|
// using a forLoop so future addition
|
|
// doesn't require changes in this function
|
|
var flagNames []string
|
|
for _, flag := range NetworkFlags {
|
|
flagNames = append(flagNames, "--"+flag.Names()[0])
|
|
}
|
|
return fmt.Errorf("cannot use more than one network flag at the same time. Possible network flags are: %s", strings.Join(flagNames, ", "))
|
|
}
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// BlacklistedBlock returns weather the given block root belongs to the list of blacklisted roots.
|
|
func BlacklistedBlock(r [32]byte) bool {
|
|
blacklisted := Get().BlacklistedRoots
|
|
_, ok := blacklisted[r]
|
|
return ok
|
|
}
|