|
@@ -50,9 +50,10 @@ import (
|
|
|
)
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
var (
|
|
|
- p2pNetworkID *string
|
|
|
|
|
- p2pPort *uint
|
|
|
|
|
- p2pBootstrap *string
|
|
|
|
|
|
|
+ p2pNetworkID *string
|
|
|
|
|
+ p2pPort *uint
|
|
|
|
|
+ p2pBootstrap *string
|
|
|
|
|
+ protectedPeers []string
|
|
|
|
|
|
|
|
nodeKeyPath *string
|
|
nodeKeyPath *string
|
|
|
|
|
|
|
@@ -262,6 +263,7 @@ var (
|
|
|
ccqAllowedRequesters *string
|
|
ccqAllowedRequesters *string
|
|
|
ccqP2pPort *uint
|
|
ccqP2pPort *uint
|
|
|
ccqP2pBootstrap *string
|
|
ccqP2pBootstrap *string
|
|
|
|
|
+ ccqProtectedPeers []string
|
|
|
ccqAllowedPeers *string
|
|
ccqAllowedPeers *string
|
|
|
ccqBackfillCache *bool
|
|
ccqBackfillCache *bool
|
|
|
|
|
|
|
@@ -282,6 +284,7 @@ func init() {
|
|
|
p2pNetworkID = NodeCmd.Flags().String("network", "", "P2P network identifier (optional, overrides default for environment)")
|
|
p2pNetworkID = NodeCmd.Flags().String("network", "", "P2P network identifier (optional, overrides default for environment)")
|
|
|
p2pPort = NodeCmd.Flags().Uint("port", p2p.DefaultPort, "P2P UDP listener port")
|
|
p2pPort = NodeCmd.Flags().Uint("port", p2p.DefaultPort, "P2P UDP listener port")
|
|
|
p2pBootstrap = NodeCmd.Flags().String("bootstrap", "", "P2P bootstrap peers (optional for mainnet or testnet, overrides default, required for unsafeDevMode)")
|
|
p2pBootstrap = NodeCmd.Flags().String("bootstrap", "", "P2P bootstrap peers (optional for mainnet or testnet, overrides default, required for unsafeDevMode)")
|
|
|
|
|
+ NodeCmd.Flags().StringSliceVarP(&protectedPeers, "protectedPeers", "", []string{}, "")
|
|
|
|
|
|
|
|
statusAddr = NodeCmd.Flags().String("statusAddr", "[::]:6060", "Listen address for status server (disabled if blank)")
|
|
statusAddr = NodeCmd.Flags().String("statusAddr", "[::]:6060", "Listen address for status server (disabled if blank)")
|
|
|
|
|
|
|
@@ -491,6 +494,7 @@ func init() {
|
|
|
ccqAllowedRequesters = NodeCmd.Flags().String("ccqAllowedRequesters", "", "Comma separated list of signers allowed to submit cross chain queries")
|
|
ccqAllowedRequesters = NodeCmd.Flags().String("ccqAllowedRequesters", "", "Comma separated list of signers allowed to submit cross chain queries")
|
|
|
ccqP2pPort = NodeCmd.Flags().Uint("ccqP2pPort", 8996, "CCQ P2P UDP listener port")
|
|
ccqP2pPort = NodeCmd.Flags().Uint("ccqP2pPort", 8996, "CCQ P2P UDP listener port")
|
|
|
ccqP2pBootstrap = NodeCmd.Flags().String("ccqP2pBootstrap", "", "CCQ P2P bootstrap peers (optional for mainnet or testnet, overrides default, required for unsafeDevMode)")
|
|
ccqP2pBootstrap = NodeCmd.Flags().String("ccqP2pBootstrap", "", "CCQ P2P bootstrap peers (optional for mainnet or testnet, overrides default, required for unsafeDevMode)")
|
|
|
|
|
+ NodeCmd.Flags().StringSliceVarP(&ccqProtectedPeers, "ccqProtectedPeers", "", []string{}, "")
|
|
|
ccqAllowedPeers = NodeCmd.Flags().String("ccqAllowedPeers", "", "CCQ allowed P2P peers (comma-separated)")
|
|
ccqAllowedPeers = NodeCmd.Flags().String("ccqAllowedPeers", "", "CCQ allowed P2P peers (comma-separated)")
|
|
|
ccqBackfillCache = NodeCmd.Flags().Bool("ccqBackfillCache", true, "Should EVM chains backfill CCQ timestamp cache on startup")
|
|
ccqBackfillCache = NodeCmd.Flags().Bool("ccqBackfillCache", true, "Should EVM chains backfill CCQ timestamp cache on startup")
|
|
|
gossipAdvertiseAddress = NodeCmd.Flags().String("gossipAdvertiseAddress", "", "External IP to advertize on Guardian and CCQ p2p (use if behind a NAT or running in k8s)")
|
|
gossipAdvertiseAddress = NodeCmd.Flags().String("gossipAdvertiseAddress", "", "External IP to advertize on Guardian and CCQ p2p (use if behind a NAT or running in k8s)")
|
|
@@ -1777,7 +1781,7 @@ func runNode(cmd *cobra.Command, args []string) {
|
|
|
node.GuardianOptionGatewayRelayer(*gatewayRelayerContract, gatewayRelayerWormchainConn),
|
|
node.GuardianOptionGatewayRelayer(*gatewayRelayerContract, gatewayRelayerWormchainConn),
|
|
|
node.GuardianOptionQueryHandler(*ccqEnabled, *ccqAllowedRequesters),
|
|
node.GuardianOptionQueryHandler(*ccqEnabled, *ccqAllowedRequesters),
|
|
|
node.GuardianOptionAdminService(*adminSocketPath, ethRPC, ethContract, rpcMap),
|
|
node.GuardianOptionAdminService(*adminSocketPath, ethRPC, ethContract, rpcMap),
|
|
|
- node.GuardianOptionP2P(p2pKey, *p2pNetworkID, *p2pBootstrap, *nodeName, *subscribeToVAAs, *disableHeartbeatVerify, *p2pPort, *ccqP2pBootstrap, *ccqP2pPort, *ccqAllowedPeers, *gossipAdvertiseAddress, ibc.GetFeatures),
|
|
|
|
|
|
|
+ node.GuardianOptionP2P(p2pKey, *p2pNetworkID, *p2pBootstrap, *nodeName, *subscribeToVAAs, *disableHeartbeatVerify, *p2pPort, *ccqP2pBootstrap, *ccqP2pPort, *ccqAllowedPeers, *gossipAdvertiseAddress, ibc.GetFeatures, protectedPeers, ccqProtectedPeers),
|
|
|
node.GuardianOptionStatusServer(*statusAddr),
|
|
node.GuardianOptionStatusServer(*statusAddr),
|
|
|
node.GuardianOptionProcessor(*p2pNetworkID),
|
|
node.GuardianOptionProcessor(*p2pNetworkID),
|
|
|
}
|
|
}
|