snarkos_cli/commands/
start.rs

1// Copyright (c) 2019-2025 Provable Inc.
2// This file is part of the snarkOS library.
3
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at:
7
8// http://www.apache.org/licenses/LICENSE-2.0
9
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15
16use snarkos_account::Account;
17use snarkos_display::Display;
18use snarkos_node::{
19    Node,
20    bft::MEMORY_POOL_PORT,
21    rest::DEFAULT_REST_PORT,
22    router::{DEFAULT_NODE_PORT, messages::NodeType},
23};
24use snarkos_node_cdn::CDN_BASE_URL;
25use snarkvm::{
26    console::{
27        account::{Address, PrivateKey},
28        algorithms::Hash,
29        network::{CanaryV0, MainnetV0, Network, TestnetV0},
30    },
31    ledger::{
32        block::Block,
33        committee::{Committee, MIN_DELEGATOR_STAKE, MIN_VALIDATOR_STAKE},
34        store::{ConsensusStore, helpers::memory::ConsensusMemory},
35    },
36    prelude::{FromBytes, ToBits, ToBytes},
37    synthesizer::VM,
38    utilities::to_bytes_le,
39};
40
41use aleo_std::StorageMode;
42use anyhow::{Context, Result, bail, ensure};
43use base64::prelude::{BASE64_STANDARD, Engine};
44use clap::Parser;
45use colored::Colorize;
46use core::str::FromStr;
47use indexmap::IndexMap;
48use rand::{Rng, SeedableRng};
49use rand_chacha::ChaChaRng;
50use serde::{Deserialize, Serialize};
51use std::{
52    net::{Ipv4Addr, SocketAddr, SocketAddrV4},
53    path::PathBuf,
54    sync::{Arc, atomic::AtomicBool},
55};
56use tokio::runtime::{self, Runtime};
57
58/// The recommended minimum number of 'open files' limit for a validator.
59/// Validators should be able to handle at least 1000 concurrent connections, each requiring 2 sockets.
60#[cfg(target_family = "unix")]
61const RECOMMENDED_MIN_NOFILES_LIMIT: u64 = 2048;
62
63/// The development mode RNG seed.
64const DEVELOPMENT_MODE_RNG_SEED: u64 = 1234567890u64;
65
66/// The development mode number of genesis committee members.
67const DEVELOPMENT_MODE_NUM_GENESIS_COMMITTEE_MEMBERS: u16 = 4;
68
69/// A mapping of `staker_address` to `(validator_address, withdrawal_address, amount)`.
70#[derive(Clone, Debug, PartialEq, Eq, Deserialize, Serialize)]
71pub struct BondedBalances(IndexMap<String, (String, String, u64)>);
72
73impl FromStr for BondedBalances {
74    type Err = serde_json::Error;
75
76    fn from_str(s: &str) -> Result<Self, Self::Err> {
77        serde_json::from_str(s)
78    }
79}
80
81/// Starts the snarkOS node.
82#[derive(Clone, Debug, Parser)]
83#[command(
84    // Use kebab-case for all arguments (e.g., use the `private-key` flag for the `private_key` field).
85    // This is already the default, but we specify it in case clap's default changes in the future.
86    rename_all = "kebab-case",
87
88    // Ensure at most one node type is specified.
89    group(clap::ArgGroup::new("node_type").required(false).multiple(false)
90),
91
92    // Ensure all other dev flags can only be set if `--dev` is set.
93    group(clap::ArgGroup::new("dev_flags").required(false).multiple(true).requires("dev")
94),
95    // Ensure any rest flag (including `--rest`) cannot be set
96    // if `--norest` is set.
97    group(clap::ArgGroup::new("rest_flags").required(false).multiple(true).conflicts_with("norest")),
98
99    // Ensure you cannot set --verbosity and --log-filter flags at the same time.
100    group(clap::ArgGroup::new("log_flags").required(false).multiple(false)),
101)]
102pub struct Start {
103    /// Specify the network ID of this node
104    /// [options: 0 = mainnet, 1 = testnet, 2 = canary]
105    #[clap(long, default_value_t=MainnetV0::ID, long, value_parser = clap::value_parser!(u16).range((MainnetV0::ID as i64)..=(CanaryV0::ID as i64)))]
106    pub network: u16,
107
108    /// Start the node as a prover.
109    #[clap(long, group = "node_type")]
110    pub prover: bool,
111
112    /// Start the node as a client (default).
113    ///
114    /// Client are "full nodes", i.e, validate and execute all blocks they receive, but they do not participate in AleoBFT consensus.
115    #[clap(long, group = "node_type", verbatim_doc_comment)]
116    pub client: bool,
117
118    /// Start the node as a validator.
119    ///
120    /// Validators are "full nodes", like clients, but also participate in AleoBFT.
121    #[clap(long, group = "node_type", verbatim_doc_comment)]
122    pub validator: bool,
123
124    /// Specify the account private key of the node
125    #[clap(long)]
126    pub private_key: Option<String>,
127
128    /// Specify the path to a file containing the account private key of the node
129    #[clap(long = "private-key-file")]
130    pub private_key_file: Option<PathBuf>,
131
132    /// Set the IP address and port used for P2P communication.
133    #[clap(long)]
134    pub node: Option<SocketAddr>,
135
136    /// Set the IP address and port used for BFT communication.
137    /// This argument is only allowed for validator nodes.
138    #[clap(long, requires = "validator")]
139    pub bft: Option<SocketAddr>,
140
141    /// Specify the IP address and port of the peer(s) to connect to (as a comma-separated list).
142    ///
143    /// These peers will be set as "trusted", which means the node will not disconnect from them when performing peer rotation.
144    ///
145    /// Setting peers to "" has the same effect as not setting the flag at all, except when using `--dev`.
146    #[clap(long, verbatim_doc_comment)]
147    pub peers: Option<String>,
148
149    /// Specify the IP address and port of the validator(s) to connect to.
150    #[clap(long)]
151    pub validators: Option<String>,
152
153    /// Allow untrusted peers (not listed in `--peers`) to connect.
154    ///
155    /// The flag will be ignored by client and prover nodes, as tis behavior is always enabled for these types of nodes.
156    #[clap(long, verbatim_doc_comment)]
157    pub allow_external_peers: bool,
158
159    /// If the flag is set, a client will periodically evict more external peers
160    #[clap(long)]
161    pub rotate_external_peers: bool,
162
163    /// Specify the IP address and port for the REST server
164    #[clap(long, group = "rest_flags")]
165    pub rest: Option<SocketAddr>,
166
167    /// Specify the requests per second (RPS) rate limit per IP for the REST server
168    #[clap(long, default_value_t = 10, group = "rest_flags")]
169    pub rest_rps: u32,
170
171    /// Specify the JWT secret for the REST server (16B, base64-encoded).
172    #[clap(long, group = "rest_flags")]
173    pub jwt_secret: Option<String>,
174
175    /// Specify the JWT creation timestamp; can be any time in the last 10 years.
176    #[clap(long, group = "rest_flags")]
177    pub jwt_timestamp: Option<i64>,
178
179    /// If the flag is set, the node will not initialize the REST server.
180    #[clap(long)]
181    pub norest: bool,
182
183    /// Write log message to stdout instead of showing a terminal UI.
184    ///
185    /// This is useful, for example, for running a node as a service instead of in the foreground or to pipe its output into a file.
186    #[clap(long, verbatim_doc_comment)]
187    pub nodisplay: bool,
188
189    /// Specify the log verbosity of the node.
190    /// [options: 0 (lowest log level) to 6 (highest level)]
191    #[clap(long, default_value_t = 1, group = "log_flags")]
192    pub verbosity: u8,
193
194    /// Set a custom log filtering scheme, e.g., "off,snarkos_bft=trace", to show all log messages of snarkos_bft but nothing else.
195    #[clap(long, group = "log_flags")]
196    pub log_filter: Option<String>,
197
198    /// Specify the path to the file where logs will be stored
199    #[clap(long, default_value_os_t = std::env::temp_dir().join("snarkos.log"))]
200    pub logfile: PathBuf,
201
202    /// Enable the metrics exporter
203    #[cfg(feature = "metrics")]
204    #[clap(long)]
205    pub metrics: bool,
206
207    /// Specify the IP address and port for the metrics exporter
208    #[cfg(feature = "metrics")]
209    #[clap(long, requires = "metrics")]
210    pub metrics_ip: Option<SocketAddr>,
211
212    /// Specify the path to a directory containing the storage database for the ledger.
213    /// This flag overrides the default path, even when `--dev` is set.
214    #[clap(long)]
215    pub storage: Option<PathBuf>,
216
217    /// Enables the node to prefetch initial blocks from a CDN
218    #[clap(long, conflicts_with = "nocdn")]
219    pub cdn: Option<String>,
220
221    /// If the flag is set, the node will not prefetch from a CDN
222    #[clap(long)]
223    pub nocdn: bool,
224
225    /// Enables development mode used to set up test networks.
226    ///
227    /// The purpose of this flag is to run multiple nodes on the same machine and in the same working directory.
228    /// To do this, set the value to a unique ID within the test work. For example if there are four nodes in the network, pass `--dev 0` for the first node, `--dev 1` for the second, and so forth.
229    ///
230    /// If you do not explicitly set the `--peers` flag, this will also populate the set of trusted peers, so that the network is fully connected.
231    /// Additionally, if you do not set the `--rest` or the `--norest` flags, it will also set the REST port to `3030` for the first node, `3031` for the second, and so forth.
232    #[clap(long, verbatim_doc_comment)]
233    pub dev: Option<u16>,
234
235    /// If development mode is enabled, specify the number of genesis validator.
236    #[clap(long, group = "dev-flags", default_value_t=DEVELOPMENT_MODE_NUM_GENESIS_COMMITTEE_MEMBERS)]
237    pub dev_num_validators: u16,
238
239    /// If development mode is enabled, specify whether node 0 should generate traffic to drive the network.
240    #[clap(long, group = "dev-flag")]
241    pub no_dev_txs: bool,
242
243    /// If development mode is enabled, specify the custom bonded balances as a JSON object.
244    #[clap(long, group = "dev-flags")]
245    pub dev_bonded_balances: Option<BondedBalances>,
246}
247
248impl Start {
249    /// Starts the snarkOS node.
250    pub fn parse(self) -> Result<String> {
251        // Prepare the shutdown flag.
252        let shutdown: Arc<AtomicBool> = Default::default();
253
254        // Initialize the logger.
255        let log_receiver = crate::helpers::initialize_logger(
256            self.verbosity,
257            &self.log_filter,
258            self.nodisplay,
259            self.logfile.clone(),
260            shutdown.clone(),
261        )
262        .with_context(|| "Failed to set up logger")?;
263
264        // Initialize the runtime.
265        Self::runtime().block_on(async move {
266            // Error messages.
267            let node_parse_error = || "Failed to parse node arguments";
268            let display_start_error = || "Failed to initialize the display";
269
270            // Clone the configurations.
271            let mut cli = self.clone();
272            // Parse the network.
273            match cli.network {
274                MainnetV0::ID => {
275                    // Parse the node from the configurations.
276                    let node = cli.parse_node::<MainnetV0>(shutdown.clone()).await.with_context(node_parse_error)?;
277                    // If the display is enabled, render the display.
278                    if !cli.nodisplay {
279                        // Initialize the display.
280                        Display::start(node, log_receiver).with_context(display_start_error)?;
281                    }
282                }
283                TestnetV0::ID => {
284                    // Parse the node from the configurations.
285                    let node = cli.parse_node::<TestnetV0>(shutdown.clone()).await.with_context(node_parse_error)?;
286                    // If the display is enabled, render the display.
287                    if !cli.nodisplay {
288                        // Initialize the display.
289                        Display::start(node, log_receiver).with_context(display_start_error)?;
290                    }
291                }
292                CanaryV0::ID => {
293                    // Parse the node from the configurations.
294                    let node = cli.parse_node::<CanaryV0>(shutdown.clone()).await.with_context(node_parse_error)?;
295                    // If the display is enabled, render the display.
296                    if !cli.nodisplay {
297                        // Initialize the display.
298                        Display::start(node, log_receiver).with_context(display_start_error)?;
299                    }
300                }
301                _ => panic!("Invalid network ID specified"),
302            };
303            // Note: Do not move this. The pending await must be here otherwise
304            // other snarkOS commands will not exit.
305            std::future::pending::<()>().await;
306            Ok(String::new())
307        })
308    }
309}
310
311impl Start {
312    /// Returns the initial peer(s) to connect to, from the given configurations.
313    fn parse_trusted_peers(&self) -> Result<Vec<SocketAddr>> {
314        let Some(peers) = &self.peers else { return Ok(vec![]) };
315
316        // Split on an empty string returns an empty string.
317        if peers.is_empty() {
318            return Ok(vec![]);
319        }
320
321        let mut result = vec![];
322        for ip in peers.split(',') {
323            match ip.parse::<SocketAddr>() {
324                Ok(ip) => result.push(ip),
325                Err(err) => bail!("An address supplied to --peers ('{ip}') is malformed: {err}"),
326            }
327        }
328
329        Ok(result)
330    }
331
332    /// Returns the initial validator(s) to connect to, from the given configurations.
333    fn parse_trusted_validators(&self) -> Result<Vec<SocketAddr>> {
334        let Some(validators) = &self.validators else { return Ok(vec![]) };
335
336        // Split on an empty string returns an empty string.
337        if validators.is_empty() {
338            return Ok(vec![]);
339        }
340
341        let mut result = vec![];
342        for ip in validators.split(',') {
343            match ip.parse::<SocketAddr>() {
344                Ok(ip) => result.push(ip),
345                Err(err) => bail!("An address supplied to --validators ('{ip}') is malformed: {err}"),
346            }
347        }
348
349        Ok(result)
350    }
351
352    /// Returns the CDN to prefetch initial blocks from, from the given configurations.
353    fn parse_cdn<N: Network>(&self) -> Option<String> {
354        // Determine if the node type is not declared.
355        let is_no_node_type = !(self.validator || self.prover || self.client);
356
357        // Disable CDN if:
358        //  1. The node is in development mode.
359        //  2. The user has explicitly disabled CDN.
360        //  3. The node is a prover (no need to sync).
361        //  4. The node type is not declared (defaults to client) (no need to sync).
362        if self.dev.is_some() || self.nocdn || self.prover || is_no_node_type {
363            None
364        }
365        // Enable the CDN otherwise.
366        else {
367            // Determine the CDN URL.
368            match &self.cdn {
369                // Use the provided CDN URL if it is not empty.
370                Some(cdn) => match cdn.is_empty() {
371                    true => None,
372                    false => Some(cdn.clone()),
373                },
374                // If no CDN URL is provided, determine the CDN URL based on the network ID.
375                None => match N::ID {
376                    MainnetV0::ID => Some(format!("{CDN_BASE_URL}/mainnet")),
377                    TestnetV0::ID => Some(format!("{CDN_BASE_URL}/testnet")),
378                    CanaryV0::ID => Some(format!("{CDN_BASE_URL}/canary")),
379                    _ => None,
380                },
381            }
382        }
383    }
384
385    /// Read the private key directly from an argument or from a filesystem location,
386    /// returning the Aleo account.
387    fn parse_private_key<N: Network>(&self) -> Result<Account<N>> {
388        match self.dev {
389            None => match (&self.private_key, &self.private_key_file) {
390                // Parse the private key directly.
391                (Some(private_key), None) => Account::from_str(private_key.trim()),
392                // Parse the private key from a file.
393                (None, Some(path)) => {
394                    check_permissions(path)?;
395                    Account::from_str(std::fs::read_to_string(path)?.trim())
396                }
397                // Ensure the private key is provided to the CLI, except for clients or nodes in development mode.
398                (None, None) => match self.client {
399                    true => Account::new(&mut rand::thread_rng()),
400                    false => bail!("Missing the '--private-key' or '--private-key-file' argument"),
401                },
402                // Ensure only one private key flag is provided to the CLI.
403                (Some(_), Some(_)) => {
404                    bail!("Cannot use '--private-key' and '--private-key-file' simultaneously, please use only one")
405                }
406            },
407            Some(dev) => {
408                // Sample the private key of this node.
409                Account::try_from({
410                    // Initialize the (fixed) RNG.
411                    let mut rng = ChaChaRng::seed_from_u64(DEVELOPMENT_MODE_RNG_SEED);
412                    // Iterate through 'dev' address instances to match the account.
413                    for _ in 0..dev {
414                        let _ = PrivateKey::<N>::new(&mut rng)?;
415                    }
416                    let private_key = PrivateKey::<N>::new(&mut rng)?;
417                    println!("🔑 Your development private key for node {dev} is {}.\n", private_key.to_string().bold());
418                    private_key
419                })
420            }
421        }
422    }
423
424    /// Updates the configurations if the node is in development mode.
425    fn parse_development(&mut self, trusted_peers: &mut Vec<SocketAddr>, trusted_validators: &mut Vec<SocketAddr>) {
426        // If `--dev` is set, assume the dev nodes are initialized from 0 to `dev`,
427        // and add each of them to the trusted peers. In addition, set the node IP to `4130 + dev`,
428        // and the REST port to `3030 + dev`.
429
430        if let Some(dev) = self.dev {
431            // Add the dev nodes to the trusted peers.
432            if trusted_peers.is_empty() {
433                for i in 0..dev {
434                    trusted_peers.push(SocketAddr::V4(SocketAddrV4::new(Ipv4Addr::LOCALHOST, DEFAULT_NODE_PORT + i)));
435                }
436            }
437            // Add the dev nodes to the trusted validators.
438            if trusted_validators.is_empty() {
439                // To avoid ambiguity, we define the first few nodes to be the trusted validators to connect to.
440                for i in 0..2 {
441                    // Don't connect to yourself.
442                    if i == dev {
443                        continue;
444                    }
445
446                    trusted_validators
447                        .push(SocketAddr::V4(SocketAddrV4::new(Ipv4Addr::LOCALHOST, MEMORY_POOL_PORT + i)));
448                }
449            }
450            // Set the node IP to `4130 + dev`.
451            //
452            // Note: the `node` flag is an option to detect remote devnet testing.
453            if self.node.is_none() {
454                self.node = Some(SocketAddr::V4(SocketAddrV4::new(Ipv4Addr::UNSPECIFIED, DEFAULT_NODE_PORT + dev)));
455            }
456
457            // If the `norest` flag is not set and the REST IP is not already specified set the REST IP to `3030 + dev`.
458            if !self.norest && self.rest.is_none() {
459                self.rest = Some(SocketAddr::V4(SocketAddrV4::new(Ipv4Addr::UNSPECIFIED, DEFAULT_REST_PORT + dev)));
460            }
461        }
462    }
463
464    /// Returns an alternative genesis block if the node is in development mode.
465    /// Otherwise, returns the actual genesis block.
466    fn parse_genesis<N: Network>(&self) -> Result<Block<N>> {
467        if self.dev.is_some() {
468            // Determine the number of genesis committee members.
469            let num_committee_members = self.dev_num_validators;
470            ensure!(
471                num_committee_members >= DEVELOPMENT_MODE_NUM_GENESIS_COMMITTEE_MEMBERS,
472                "Number of genesis committee members is too low"
473            );
474
475            // Initialize the (fixed) RNG.
476            let mut rng = ChaChaRng::seed_from_u64(DEVELOPMENT_MODE_RNG_SEED);
477            // Initialize the development private keys.
478            let dev_keys =
479                (0..num_committee_members).map(|_| PrivateKey::<N>::new(&mut rng)).collect::<Result<Vec<_>>>()?;
480            // Initialize the development addresses.
481            let development_addresses = dev_keys.iter().map(Address::<N>::try_from).collect::<Result<Vec<_>>>()?;
482
483            // Construct the committee based on the state of the bonded balances.
484            let (committee, bonded_balances) = match &self.dev_bonded_balances {
485                Some(bonded_balances) => {
486                    // Parse the bonded balances.
487                    let bonded_balances = bonded_balances
488                        .0
489                        .iter()
490                        .map(|(staker_address, (validator_address, withdrawal_address, amount))| {
491                            let staker_addr = Address::<N>::from_str(staker_address)?;
492                            let validator_addr = Address::<N>::from_str(validator_address)?;
493                            let withdrawal_addr = Address::<N>::from_str(withdrawal_address)?;
494                            Ok((staker_addr, (validator_addr, withdrawal_addr, *amount)))
495                        })
496                        .collect::<Result<IndexMap<_, _>>>()?;
497
498                    // Construct the committee members.
499                    let mut members = IndexMap::new();
500                    for (staker_address, (validator_address, _, amount)) in bonded_balances.iter() {
501                        // Ensure that the staking amount is sufficient.
502                        match staker_address == validator_address {
503                            true => ensure!(amount >= &MIN_VALIDATOR_STAKE, "Validator stake is too low"),
504                            false => ensure!(amount >= &MIN_DELEGATOR_STAKE, "Delegator stake is too low"),
505                        }
506
507                        // Ensure that the validator address is included in the list of development addresses.
508                        ensure!(
509                            development_addresses.contains(validator_address),
510                            "Validator address {validator_address} is not included in the list of development addresses"
511                        );
512
513                        // Add or update the validator entry in the list of members
514                        members.entry(*validator_address).and_modify(|(stake, _, _)| *stake += amount).or_insert((
515                            *amount,
516                            true,
517                            rng.gen_range(0..100),
518                        ));
519                    }
520                    // Construct the committee.
521                    let committee = Committee::<N>::new(0u64, members)?;
522                    (committee, bonded_balances)
523                }
524                None => {
525                    // Calculate the committee stake per member.
526                    let stake_per_member =
527                        N::STARTING_SUPPLY.saturating_div(2).saturating_div(num_committee_members as u64);
528                    ensure!(stake_per_member >= MIN_VALIDATOR_STAKE, "Committee stake per member is too low");
529
530                    // Construct the committee members and distribute stakes evenly among committee members.
531                    let members = development_addresses
532                        .iter()
533                        .map(|address| (*address, (stake_per_member, true, rng.gen_range(0..100))))
534                        .collect::<IndexMap<_, _>>();
535
536                    // Construct the bonded balances.
537                    // Note: The withdrawal address is set to the staker address.
538                    let bonded_balances = members
539                        .iter()
540                        .map(|(address, (stake, _, _))| (*address, (*address, *address, *stake)))
541                        .collect::<IndexMap<_, _>>();
542                    // Construct the committee.
543                    let committee = Committee::<N>::new(0u64, members)?;
544
545                    (committee, bonded_balances)
546                }
547            };
548
549            // Ensure that the number of committee members is correct.
550            ensure!(
551                committee.members().len() == num_committee_members as usize,
552                "Number of committee members {} does not match the expected number of members {num_committee_members}",
553                committee.members().len()
554            );
555
556            // Calculate the public balance per validator.
557            let remaining_balance = N::STARTING_SUPPLY.saturating_sub(committee.total_stake());
558            let public_balance_per_validator = remaining_balance.saturating_div(num_committee_members as u64);
559
560            // Construct the public balances with fairly equal distribution.
561            let mut public_balances = dev_keys
562                .iter()
563                .map(|private_key| Ok((Address::try_from(private_key)?, public_balance_per_validator)))
564                .collect::<Result<indexmap::IndexMap<_, _>>>()?;
565
566            // If there is some leftover balance, add it to the 0-th validator.
567            let leftover =
568                remaining_balance.saturating_sub(public_balance_per_validator * num_committee_members as u64);
569            if leftover > 0 {
570                let (_, balance) = public_balances.get_index_mut(0).unwrap();
571                *balance += leftover;
572            }
573
574            // Check if the sum of committee stakes and public balances equals the total starting supply.
575            let public_balances_sum: u64 = public_balances.values().copied().sum();
576            if committee.total_stake() + public_balances_sum != N::STARTING_SUPPLY {
577                bail!("Sum of committee stakes and public balances does not equal total starting supply.");
578            }
579
580            // Construct the genesis block.
581            load_or_compute_genesis(dev_keys[0], committee, public_balances, bonded_balances, &mut rng)
582        } else {
583            Block::from_bytes_le(N::genesis_bytes())
584        }
585    }
586
587    /// Returns the node type specified in the command-line arguments.
588    /// This will return `NodeType::Client` if no node type was specified by the user.
589    const fn parse_node_type(&self) -> NodeType {
590        if self.validator {
591            NodeType::Validator
592        } else if self.prover {
593            NodeType::Prover
594        } else {
595            NodeType::Client
596        }
597    }
598
599    /// Returns the node type corresponding to the given configurations.
600    #[rustfmt::skip]
601    async fn parse_node<N: Network>(&mut self, shutdown: Arc<AtomicBool>) -> Result<Node<N>> {
602        // Print the welcome.
603        println!("{}", crate::helpers::welcome_message());
604
605        // Check if we are running with the lower coinbase and proof targets. This should only be
606        // allowed in --dev mode and should not be allowed in mainnet mode.
607        if cfg!(feature = "test_network") && self.dev.is_none() {
608            bail!("The 'test_network' feature is enabled, but the '--dev' flag is not set");
609        }
610
611        // Parse the trusted peers to connect to.
612        let mut trusted_peers = self.parse_trusted_peers()?;
613        // Parse the trusted validators to connect to.
614        let mut trusted_validators = self.parse_trusted_validators()?;
615        // Parse the development configurations.
616        self.parse_development(&mut trusted_peers, &mut trusted_validators);
617
618        // Parse the CDN.
619        let cdn = self.parse_cdn::<N>();
620
621        // Parse the genesis block.
622        let genesis = self.parse_genesis::<N>()?;
623        // Parse the private key of the node.
624        let account = self.parse_private_key::<N>()?;
625        // Parse the node type.
626        let node_type = self.parse_node_type();
627
628        // Parse the node IP or use the default IP/port.
629        let node_ip = self.node.unwrap_or(SocketAddr::V4(SocketAddrV4::new(Ipv4Addr::UNSPECIFIED, DEFAULT_NODE_PORT)));
630
631        // Parse the REST IP.
632        let rest_ip = match self.norest {
633            true => None,
634            false => self.rest.or_else(|| Some("0.0.0.0:3030".parse().unwrap())),
635        };
636
637        // If the display is not enabled, render the welcome message.
638        if self.nodisplay {
639            // Print the Aleo address.
640            println!("👛 Your Aleo address is {}.\n", account.address().to_string().bold());
641            // Print the node type and network.
642            println!(
643                "🧭 Starting {} on {} at {}.\n",
644                node_type.description().bold(),
645                N::NAME.bold(),
646                node_ip.to_string().bold()
647            );
648
649            // If the node is running a REST server, print the REST IP and JWT.
650            if node_type.is_validator() || node_type.is_client() {
651                if let Some(rest_ip) = rest_ip {
652                    println!("🌐 Starting the REST server at {}.\n", rest_ip.to_string().bold());
653
654                    let jwt_secret = if let Some(jwt_b64) = &self.jwt_secret {
655                        if self.jwt_timestamp.is_none() {
656                            bail!("The '--jwt-timestamp' flag must be set if the '--jwt-secret' flag is set");
657                        }
658                        let jwt_bytes = BASE64_STANDARD.decode(jwt_b64).map_err(|_| anyhow::anyhow!("Invalid JWT secret"))?;
659                        if jwt_bytes.len() != 16 {
660                            bail!("The JWT secret must be 16 bytes long");
661                        }
662                        Some(jwt_bytes)
663                    } else {
664                        None
665                    };
666
667                    if let Ok(jwt_token) = snarkos_node_rest::Claims::new(account.address(), jwt_secret, self.jwt_timestamp).to_jwt_string() {
668                        println!("🔑 Your one-time JWT token is {}\n", jwt_token.dimmed());
669                    }
670                }
671            }
672        }
673
674        // If the node is a validator, check if the open files limit is lower than recommended.
675        #[cfg(target_family = "unix")]
676        if node_type.is_validator() {
677            crate::helpers::check_open_files_limit(RECOMMENDED_MIN_NOFILES_LIMIT);
678        }
679        // Check if the machine meets the minimum requirements for a validator.
680        crate::helpers::check_validator_machine(node_type);
681
682        // Initialize the metrics.
683        #[cfg(feature = "metrics")]
684        if self.metrics {
685            metrics::initialize_metrics(self.metrics_ip);
686        }
687
688        // Initialize the storage mode.
689        let storage_mode = match &self.storage {
690            Some(path) => StorageMode::Custom(path.clone()),
691            None => match self.dev {
692                Some(id) => StorageMode::Development(id),
693                None => StorageMode::Production,
694            },
695        };
696
697        // Determine whether to generate background transactions in dev mode.
698        let dev_txs = match self.dev {
699            Some(_) => !self.no_dev_txs,
700            None => {
701                // If the `no_dev_txs` flag is set, inform the user that it is ignored.
702                if self.no_dev_txs {
703                    eprintln!("The '--no-dev-txs' flag is ignored because '--dev' is not set");
704                }
705                false
706            }
707        };
708
709        // Initialize the node.
710        match node_type {
711            NodeType::Validator => Node::new_validator(node_ip, self.bft, rest_ip, self.rest_rps, account, &trusted_peers, &trusted_validators, genesis, cdn, storage_mode, self.allow_external_peers, dev_txs, shutdown.clone()).await,
712            NodeType::Prover => Node::new_prover(node_ip, account, &trusted_peers, genesis, storage_mode, shutdown.clone()).await,
713            NodeType::Client => Node::new_client(node_ip, rest_ip, self.rest_rps, account, &trusted_peers, genesis, cdn, storage_mode, self.rotate_external_peers, shutdown).await,
714        }
715    }
716
717    /// Returns a runtime for the node.
718    fn runtime() -> Runtime {
719        // Retrieve the number of cores.
720        let num_cores = num_cpus::get();
721
722        // Initialize the number of tokio worker threads, max tokio blocking threads, and rayon cores.
723        // Note: We intentionally set the number of tokio worker threads and number of rayon cores to be
724        // more than the number of physical cores, because the node is expected to be I/O-bound.
725        let (num_tokio_worker_threads, max_tokio_blocking_threads, num_rayon_cores_global) =
726            (2 * num_cores, 512, num_cores);
727
728        // Initialize the parallelization parameters.
729        rayon::ThreadPoolBuilder::new()
730            .stack_size(8 * 1024 * 1024)
731            .num_threads(num_rayon_cores_global)
732            .build_global()
733            .unwrap();
734
735        // Initialize the runtime configuration.
736        runtime::Builder::new_multi_thread()
737            .enable_all()
738            .thread_stack_size(8 * 1024 * 1024)
739            .worker_threads(num_tokio_worker_threads)
740            .max_blocking_threads(max_tokio_blocking_threads)
741            .build()
742            .expect("Failed to initialize a runtime for the router")
743    }
744}
745
746fn check_permissions(path: &PathBuf) -> Result<(), snarkvm::prelude::Error> {
747    #[cfg(target_family = "unix")]
748    {
749        use std::os::unix::fs::PermissionsExt;
750        ensure!(path.exists(), "The file '{:?}' does not exist", path);
751        crate::check_parent_permissions(path)?;
752        let permissions = path.metadata()?.permissions().mode();
753        ensure!(permissions & 0o777 == 0o600, "The file {:?} must be readable only by the owner (0600)", path);
754    }
755    Ok(())
756}
757
758/// Loads or computes the genesis block.
759fn load_or_compute_genesis<N: Network>(
760    genesis_private_key: PrivateKey<N>,
761    committee: Committee<N>,
762    public_balances: indexmap::IndexMap<Address<N>, u64>,
763    bonded_balances: indexmap::IndexMap<Address<N>, (Address<N>, Address<N>, u64)>,
764    rng: &mut ChaChaRng,
765) -> Result<Block<N>> {
766    // Construct the preimage.
767    let mut preimage = Vec::new();
768
769    // Input the network ID.
770    preimage.extend(&N::ID.to_le_bytes());
771    // Input the genesis coinbase target.
772    preimage.extend(&to_bytes_le![N::GENESIS_COINBASE_TARGET]?);
773    // Input the genesis proof target.
774    preimage.extend(&to_bytes_le![N::GENESIS_PROOF_TARGET]?);
775
776    // Input the genesis private key, committee, and public balances.
777    preimage.extend(genesis_private_key.to_bytes_le()?);
778    preimage.extend(committee.to_bytes_le()?);
779    preimage.extend(&to_bytes_le![public_balances.iter().collect::<Vec<(_, _)>>()]?);
780    preimage.extend(&to_bytes_le![
781        bonded_balances
782            .iter()
783            .flat_map(|(staker, (validator, withdrawal, amount))| to_bytes_le![staker, validator, withdrawal, amount])
784            .collect::<Vec<_>>()
785    ]?);
786
787    // Input the parameters' metadata based on network
788    match N::ID {
789        snarkvm::console::network::MainnetV0::ID => {
790            preimage.extend(snarkvm::parameters::mainnet::BondValidatorVerifier::METADATA.as_bytes());
791            preimage.extend(snarkvm::parameters::mainnet::BondPublicVerifier::METADATA.as_bytes());
792            preimage.extend(snarkvm::parameters::mainnet::UnbondPublicVerifier::METADATA.as_bytes());
793            preimage.extend(snarkvm::parameters::mainnet::ClaimUnbondPublicVerifier::METADATA.as_bytes());
794            preimage.extend(snarkvm::parameters::mainnet::SetValidatorStateVerifier::METADATA.as_bytes());
795            preimage.extend(snarkvm::parameters::mainnet::TransferPrivateVerifier::METADATA.as_bytes());
796            preimage.extend(snarkvm::parameters::mainnet::TransferPublicVerifier::METADATA.as_bytes());
797            preimage.extend(snarkvm::parameters::mainnet::TransferPrivateToPublicVerifier::METADATA.as_bytes());
798            preimage.extend(snarkvm::parameters::mainnet::TransferPublicToPrivateVerifier::METADATA.as_bytes());
799            preimage.extend(snarkvm::parameters::mainnet::FeePrivateVerifier::METADATA.as_bytes());
800            preimage.extend(snarkvm::parameters::mainnet::FeePublicVerifier::METADATA.as_bytes());
801            preimage.extend(snarkvm::parameters::mainnet::InclusionVerifier::METADATA.as_bytes());
802        }
803        snarkvm::console::network::TestnetV0::ID => {
804            preimage.extend(snarkvm::parameters::testnet::BondValidatorVerifier::METADATA.as_bytes());
805            preimage.extend(snarkvm::parameters::testnet::BondPublicVerifier::METADATA.as_bytes());
806            preimage.extend(snarkvm::parameters::testnet::UnbondPublicVerifier::METADATA.as_bytes());
807            preimage.extend(snarkvm::parameters::testnet::ClaimUnbondPublicVerifier::METADATA.as_bytes());
808            preimage.extend(snarkvm::parameters::testnet::SetValidatorStateVerifier::METADATA.as_bytes());
809            preimage.extend(snarkvm::parameters::testnet::TransferPrivateVerifier::METADATA.as_bytes());
810            preimage.extend(snarkvm::parameters::testnet::TransferPublicVerifier::METADATA.as_bytes());
811            preimage.extend(snarkvm::parameters::testnet::TransferPrivateToPublicVerifier::METADATA.as_bytes());
812            preimage.extend(snarkvm::parameters::testnet::TransferPublicToPrivateVerifier::METADATA.as_bytes());
813            preimage.extend(snarkvm::parameters::testnet::FeePrivateVerifier::METADATA.as_bytes());
814            preimage.extend(snarkvm::parameters::testnet::FeePublicVerifier::METADATA.as_bytes());
815            preimage.extend(snarkvm::parameters::testnet::InclusionVerifier::METADATA.as_bytes());
816        }
817        snarkvm::console::network::CanaryV0::ID => {
818            preimage.extend(snarkvm::parameters::canary::BondValidatorVerifier::METADATA.as_bytes());
819            preimage.extend(snarkvm::parameters::canary::BondPublicVerifier::METADATA.as_bytes());
820            preimage.extend(snarkvm::parameters::canary::UnbondPublicVerifier::METADATA.as_bytes());
821            preimage.extend(snarkvm::parameters::canary::ClaimUnbondPublicVerifier::METADATA.as_bytes());
822            preimage.extend(snarkvm::parameters::canary::SetValidatorStateVerifier::METADATA.as_bytes());
823            preimage.extend(snarkvm::parameters::canary::TransferPrivateVerifier::METADATA.as_bytes());
824            preimage.extend(snarkvm::parameters::canary::TransferPublicVerifier::METADATA.as_bytes());
825            preimage.extend(snarkvm::parameters::canary::TransferPrivateToPublicVerifier::METADATA.as_bytes());
826            preimage.extend(snarkvm::parameters::canary::TransferPublicToPrivateVerifier::METADATA.as_bytes());
827            preimage.extend(snarkvm::parameters::canary::FeePrivateVerifier::METADATA.as_bytes());
828            preimage.extend(snarkvm::parameters::canary::FeePublicVerifier::METADATA.as_bytes());
829            preimage.extend(snarkvm::parameters::canary::InclusionVerifier::METADATA.as_bytes());
830        }
831        _ => {
832            // Unrecognized Network ID
833            bail!("Unrecognized Network ID: {}", N::ID);
834        }
835    }
836
837    // Initialize the hasher.
838    let hasher = snarkvm::console::algorithms::BHP256::<N>::setup("aleo.dev.block")?;
839    // Compute the hash.
840    // NOTE: this is a fast-to-compute but *IMPERFECT* identifier for the genesis block;
841    //       to know the actual genesis block hash, you need to compute the block itself.
842    let hash = hasher.hash(&preimage.to_bits_le())?.to_string();
843
844    // A closure to load the block.
845    let load_block = |file_path| -> Result<Block<N>> {
846        // Attempts to load the genesis block file locally.
847        let buffer = std::fs::read(file_path)?;
848        // Return the genesis block.
849        Block::from_bytes_le(&buffer)
850    };
851
852    // Construct the file path.
853    let file_path = std::env::temp_dir().join(hash);
854    // Check if the genesis block exists.
855    if file_path.exists() {
856        // If the block loads successfully, return it.
857        if let Ok(block) = load_block(&file_path) {
858            return Ok(block);
859        }
860    }
861
862    /* Otherwise, compute the genesis block and store it. */
863
864    // Initialize a new VM.
865    let vm = VM::from(ConsensusStore::<N, ConsensusMemory<N>>::open(StorageMode::new_test(None))?)?;
866    // Initialize the genesis block.
867    let block = vm.genesis_quorum(&genesis_private_key, committee, public_balances, bonded_balances, rng)?;
868    // Write the genesis block to the file.
869    std::fs::write(&file_path, block.to_bytes_le()?)?;
870    // Return the genesis block.
871    Ok(block)
872}
873
874#[cfg(test)]
875mod tests {
876    use super::*;
877    use crate::commands::{CLI, Command};
878    use snarkvm::prelude::MainnetV0;
879
880    type CurrentNetwork = MainnetV0;
881
882    #[test]
883    fn test_parse_trusted_peers() {
884        let config = Start::try_parse_from(["snarkos", "--peers", ""].iter()).unwrap();
885        assert!(config.parse_trusted_peers().is_ok());
886        assert!(config.parse_trusted_peers().unwrap().is_empty());
887
888        let config = Start::try_parse_from(["snarkos", "--peers", "1.2.3.4:5"].iter()).unwrap();
889        assert!(config.parse_trusted_peers().is_ok());
890        assert_eq!(config.parse_trusted_peers().unwrap(), vec![SocketAddr::from_str("1.2.3.4:5").unwrap()]);
891
892        let config = Start::try_parse_from(["snarkos", "--peers", "1.2.3.4:5,6.7.8.9:0"].iter()).unwrap();
893        assert!(config.parse_trusted_peers().is_ok());
894        assert_eq!(config.parse_trusted_peers().unwrap(), vec![
895            SocketAddr::from_str("1.2.3.4:5").unwrap(),
896            SocketAddr::from_str("6.7.8.9:0").unwrap()
897        ]);
898    }
899
900    #[test]
901    fn test_parse_trusted_validators() {
902        let config = Start::try_parse_from(["snarkos", "--validators", ""].iter()).unwrap();
903        assert!(config.parse_trusted_validators().is_ok());
904        assert!(config.parse_trusted_validators().unwrap().is_empty());
905
906        let config = Start::try_parse_from(["snarkos", "--validators", "1.2.3.4:5"].iter()).unwrap();
907        assert!(config.parse_trusted_validators().is_ok());
908        assert_eq!(config.parse_trusted_validators().unwrap(), vec![SocketAddr::from_str("1.2.3.4:5").unwrap()]);
909
910        let config = Start::try_parse_from(["snarkos", "--validators", "1.2.3.4:5,6.7.8.9:0"].iter()).unwrap();
911        assert!(config.parse_trusted_validators().is_ok());
912        assert_eq!(config.parse_trusted_validators().unwrap(), vec![
913            SocketAddr::from_str("1.2.3.4:5").unwrap(),
914            SocketAddr::from_str("6.7.8.9:0").unwrap()
915        ]);
916    }
917
918    #[test]
919    fn test_parse_log_filter() {
920        // Ensure we cannot set, both, log-filter and verbosity
921        let result = Start::try_parse_from(["snarkos", "--verbosity=5", "--log-filter=warn"].iter());
922        assert!(result.is_err(), "Must not be able to set log-filter and verbosity at the same time");
923
924        // Ensure the values are set correctly.
925        let config = Start::try_parse_from(["snarkos", "--verbosity=5"].iter()).unwrap();
926        assert_eq!(config.verbosity, 5);
927        let config = Start::try_parse_from(["snarkos", "--log-filter=snarkos=warn"].iter()).unwrap();
928        assert_eq!(config.log_filter, Some("snarkos=warn".to_string()));
929    }
930
931    #[test]
932    fn test_parse_cdn() {
933        // Validator (Prod)
934        let config = Start::try_parse_from(["snarkos", "--validator", "--private-key", "aleo1xx"].iter()).unwrap();
935        assert!(config.parse_cdn::<CurrentNetwork>().is_some());
936        let config =
937            Start::try_parse_from(["snarkos", "--validator", "--private-key", "aleo1xx", "--cdn", "url"].iter())
938                .unwrap();
939        assert!(config.parse_cdn::<CurrentNetwork>().is_some());
940        let config =
941            Start::try_parse_from(["snarkos", "--validator", "--private-key", "aleo1xx", "--cdn", ""].iter()).unwrap();
942        assert!(config.parse_cdn::<CurrentNetwork>().is_none());
943
944        // Validator (Dev)
945        let config =
946            Start::try_parse_from(["snarkos", "--dev", "0", "--validator", "--private-key", "aleo1xx"].iter()).unwrap();
947        assert!(config.parse_cdn::<CurrentNetwork>().is_none());
948        let config = Start::try_parse_from(
949            ["snarkos", "--dev", "0", "--validator", "--private-key", "aleo1xx", "--cdn", "url"].iter(),
950        )
951        .unwrap();
952        assert!(config.parse_cdn::<CurrentNetwork>().is_none());
953        let config = Start::try_parse_from(
954            ["snarkos", "--dev", "0", "--validator", "--private-key", "aleo1xx", "--cdn", ""].iter(),
955        )
956        .unwrap();
957        assert!(config.parse_cdn::<CurrentNetwork>().is_none());
958
959        // Prover (Prod)
960        let config = Start::try_parse_from(["snarkos", "--prover", "--private-key", "aleo1xx"].iter()).unwrap();
961        assert!(config.parse_cdn::<CurrentNetwork>().is_none());
962        let config =
963            Start::try_parse_from(["snarkos", "--prover", "--private-key", "aleo1xx", "--cdn", "url"].iter()).unwrap();
964        assert!(config.parse_cdn::<CurrentNetwork>().is_none());
965        let config =
966            Start::try_parse_from(["snarkos", "--prover", "--private-key", "aleo1xx", "--cdn", ""].iter()).unwrap();
967        assert!(config.parse_cdn::<CurrentNetwork>().is_none());
968
969        // Prover (Dev)
970        let config =
971            Start::try_parse_from(["snarkos", "--dev", "0", "--prover", "--private-key", "aleo1xx"].iter()).unwrap();
972        assert!(config.parse_cdn::<CurrentNetwork>().is_none());
973        let config = Start::try_parse_from(
974            ["snarkos", "--dev", "0", "--prover", "--private-key", "aleo1xx", "--cdn", "url"].iter(),
975        )
976        .unwrap();
977        assert!(config.parse_cdn::<CurrentNetwork>().is_none());
978        let config = Start::try_parse_from(
979            ["snarkos", "--dev", "0", "--prover", "--private-key", "aleo1xx", "--cdn", ""].iter(),
980        )
981        .unwrap();
982        assert!(config.parse_cdn::<CurrentNetwork>().is_none());
983
984        // Client (Prod)
985        let config = Start::try_parse_from(["snarkos", "--client", "--private-key", "aleo1xx"].iter()).unwrap();
986        assert!(config.parse_cdn::<CurrentNetwork>().is_some());
987        let config =
988            Start::try_parse_from(["snarkos", "--client", "--private-key", "aleo1xx", "--cdn", "url"].iter()).unwrap();
989        assert!(config.parse_cdn::<CurrentNetwork>().is_some());
990        let config =
991            Start::try_parse_from(["snarkos", "--client", "--private-key", "aleo1xx", "--cdn", ""].iter()).unwrap();
992        assert!(config.parse_cdn::<CurrentNetwork>().is_none());
993
994        // Client (Dev)
995        let config =
996            Start::try_parse_from(["snarkos", "--dev", "0", "--client", "--private-key", "aleo1xx"].iter()).unwrap();
997        assert!(config.parse_cdn::<CurrentNetwork>().is_none());
998        let config = Start::try_parse_from(
999            ["snarkos", "--dev", "0", "--client", "--private-key", "aleo1xx", "--cdn", "url"].iter(),
1000        )
1001        .unwrap();
1002        assert!(config.parse_cdn::<CurrentNetwork>().is_none());
1003        let config = Start::try_parse_from(
1004            ["snarkos", "--dev", "0", "--client", "--private-key", "aleo1xx", "--cdn", ""].iter(),
1005        )
1006        .unwrap();
1007        assert!(config.parse_cdn::<CurrentNetwork>().is_none());
1008
1009        // Default (Prod)
1010        let config = Start::try_parse_from(["snarkos"].iter()).unwrap();
1011        assert!(config.parse_cdn::<CurrentNetwork>().is_none());
1012        let config = Start::try_parse_from(["snarkos", "--cdn", "url"].iter()).unwrap();
1013        assert!(config.parse_cdn::<CurrentNetwork>().is_none());
1014        let config = Start::try_parse_from(["snarkos", "--cdn", ""].iter()).unwrap();
1015        assert!(config.parse_cdn::<CurrentNetwork>().is_none());
1016
1017        // Default (Dev)
1018        let config = Start::try_parse_from(["snarkos", "--dev", "0"].iter()).unwrap();
1019        assert!(config.parse_cdn::<CurrentNetwork>().is_none());
1020        let config = Start::try_parse_from(["snarkos", "--dev", "0", "--cdn", "url"].iter()).unwrap();
1021        assert!(config.parse_cdn::<CurrentNetwork>().is_none());
1022        let config = Start::try_parse_from(["snarkos", "--dev", "0", "--cdn", ""].iter()).unwrap();
1023        assert!(config.parse_cdn::<CurrentNetwork>().is_none());
1024    }
1025
1026    #[test]
1027    fn test_parse_development_and_genesis() {
1028        let prod_genesis = Block::from_bytes_le(CurrentNetwork::genesis_bytes()).unwrap();
1029
1030        let mut trusted_peers = vec![];
1031        let mut trusted_validators = vec![];
1032        let mut config = Start::try_parse_from(["snarkos"].iter()).unwrap();
1033        config.parse_development(&mut trusted_peers, &mut trusted_validators);
1034        let candidate_genesis = config.parse_genesis::<CurrentNetwork>().unwrap();
1035        assert_eq!(trusted_peers.len(), 0);
1036        assert_eq!(trusted_validators.len(), 0);
1037        assert_eq!(candidate_genesis, prod_genesis);
1038
1039        let _config = Start::try_parse_from(["snarkos", "--dev", ""].iter()).unwrap_err();
1040
1041        let mut trusted_peers = vec![];
1042        let mut trusted_validators = vec![];
1043        let mut config = Start::try_parse_from(["snarkos", "--dev", "1"].iter()).unwrap();
1044        config.parse_development(&mut trusted_peers, &mut trusted_validators);
1045        assert_eq!(config.rest, Some(SocketAddr::from_str("0.0.0.0:3031").unwrap()));
1046
1047        let mut trusted_peers = vec![];
1048        let mut trusted_validators = vec![];
1049        let mut config = Start::try_parse_from(["snarkos", "--dev", "1", "--rest", "127.0.0.1:8080"].iter()).unwrap();
1050        config.parse_development(&mut trusted_peers, &mut trusted_validators);
1051        assert_eq!(config.rest, Some(SocketAddr::from_str("127.0.0.1:8080").unwrap()));
1052
1053        let mut trusted_peers = vec![];
1054        let mut trusted_validators = vec![];
1055        let mut config = Start::try_parse_from(["snarkos", "--dev", "1", "--norest"].iter()).unwrap();
1056        config.parse_development(&mut trusted_peers, &mut trusted_validators);
1057        assert!(config.rest.is_none());
1058
1059        let mut trusted_peers = vec![];
1060        let mut trusted_validators = vec![];
1061        let mut config = Start::try_parse_from(["snarkos", "--dev", "0"].iter()).unwrap();
1062        config.parse_development(&mut trusted_peers, &mut trusted_validators);
1063        let expected_genesis = config.parse_genesis::<CurrentNetwork>().unwrap();
1064        assert_eq!(config.node, Some(SocketAddr::from_str("0.0.0.0:4130").unwrap()));
1065        assert_eq!(config.rest, Some(SocketAddr::from_str("0.0.0.0:3030").unwrap()));
1066        assert_eq!(trusted_peers.len(), 0);
1067        assert_eq!(trusted_validators.len(), 1);
1068        assert!(!config.validator);
1069        assert!(!config.prover);
1070        assert!(!config.client);
1071        assert_ne!(expected_genesis, prod_genesis);
1072
1073        let mut trusted_peers = vec![];
1074        let mut trusted_validators = vec![];
1075        let mut config =
1076            Start::try_parse_from(["snarkos", "--dev", "1", "--validator", "--private-key", ""].iter()).unwrap();
1077        config.parse_development(&mut trusted_peers, &mut trusted_validators);
1078        let genesis = config.parse_genesis::<CurrentNetwork>().unwrap();
1079        assert_eq!(config.node, Some(SocketAddr::from_str("0.0.0.0:4131").unwrap()));
1080        assert_eq!(config.rest, Some(SocketAddr::from_str("0.0.0.0:3031").unwrap()));
1081        assert_eq!(trusted_peers.len(), 1);
1082        assert_eq!(trusted_validators.len(), 1);
1083        assert!(config.validator);
1084        assert!(!config.prover);
1085        assert!(!config.client);
1086        assert_eq!(genesis, expected_genesis);
1087
1088        let mut trusted_peers = vec![];
1089        let mut trusted_validators = vec![];
1090        let mut config =
1091            Start::try_parse_from(["snarkos", "--dev", "2", "--prover", "--private-key", ""].iter()).unwrap();
1092        config.parse_development(&mut trusted_peers, &mut trusted_validators);
1093        let genesis = config.parse_genesis::<CurrentNetwork>().unwrap();
1094        assert_eq!(config.node, Some(SocketAddr::from_str("0.0.0.0:4132").unwrap()));
1095        assert_eq!(config.rest, Some(SocketAddr::from_str("0.0.0.0:3032").unwrap()));
1096        assert_eq!(trusted_peers.len(), 2);
1097        assert_eq!(trusted_validators.len(), 2);
1098        assert!(!config.validator);
1099        assert!(config.prover);
1100        assert!(!config.client);
1101        assert_eq!(genesis, expected_genesis);
1102
1103        let mut trusted_peers = vec![];
1104        let mut trusted_validators = vec![];
1105        let mut config =
1106            Start::try_parse_from(["snarkos", "--dev", "3", "--client", "--private-key", ""].iter()).unwrap();
1107        config.parse_development(&mut trusted_peers, &mut trusted_validators);
1108        let genesis = config.parse_genesis::<CurrentNetwork>().unwrap();
1109        assert_eq!(config.node, Some(SocketAddr::from_str("0.0.0.0:4133").unwrap()));
1110        assert_eq!(config.rest, Some(SocketAddr::from_str("0.0.0.0:3033").unwrap()));
1111        assert_eq!(trusted_peers.len(), 3);
1112        assert_eq!(trusted_validators.len(), 2);
1113        assert!(!config.validator);
1114        assert!(!config.prover);
1115        assert!(config.client);
1116        assert_eq!(genesis, expected_genesis);
1117    }
1118
1119    #[test]
1120    fn clap_snarkos_start() {
1121        let arg_vec = vec![
1122            "snarkos",
1123            "start",
1124            "--nodisplay",
1125            "--dev",
1126            "2",
1127            "--validator",
1128            "--private-key",
1129            "PRIVATE_KEY",
1130            "--cdn",
1131            "CDN",
1132            "--peers",
1133            "IP1,IP2,IP3",
1134            "--validators",
1135            "IP1,IP2,IP3",
1136            "--rest",
1137            "127.0.0.1:3030",
1138        ];
1139        let cli = CLI::parse_from(arg_vec);
1140
1141        if let Command::Start(start) = cli.command {
1142            assert!(start.nodisplay);
1143            assert_eq!(start.dev, Some(2));
1144            assert!(start.validator);
1145            assert_eq!(start.private_key.as_deref(), Some("PRIVATE_KEY"));
1146            assert_eq!(start.cdn, Some("CDN".to_string()));
1147            assert_eq!(start.rest, Some("127.0.0.1:3030".parse().unwrap()));
1148            assert_eq!(start.network, 0);
1149            assert_eq!(start.peers, Some("IP1,IP2,IP3".to_string()));
1150            assert_eq!(start.validators, Some("IP1,IP2,IP3".to_string()));
1151        } else {
1152            panic!("Unexpected result of clap parsing!");
1153        }
1154    }
1155}