@@ -629,15 +629,15 @@ var (
629629 Value : 30303 ,
630630 Category : flags .NetworkingCategory ,
631631 }
632- PeersWhitelistFlag = & cli.StringFlag {
633- Name : "peers-whitelist " ,
634- Usage : "Comma separated NodeID or enode URLs for peer whitelist (only connect to them)" ,
632+ PeersAllowlistFlag = & cli.StringFlag {
633+ Name : "peers-allowlist " ,
634+ Usage : "Comma separated NodeID or enode URLs for peer allowlist (only connect to them)" ,
635635 Value : "" ,
636636 Category : flags .NetworkingCategory ,
637637 }
638- PeersBlacklistFlag = & cli.StringFlag {
639- Name : "peers-blacklist " ,
640- Usage : "Comma separated NodeID or enode URLs for peer blacklist (will not connect to them)" ,
638+ PeersDenylistFlag = & cli.StringFlag {
639+ Name : "peers-denylist " ,
640+ Usage : "Comma separated NodeID or enode URLs for peer denylist (will not connect to them)" ,
641641 Value : "" ,
642642 Category : flags .NetworkingCategory ,
643643 }
@@ -918,66 +918,66 @@ func setNodeUserIdent(ctx *cli.Context, cfg *node.Config) {
918918 }
919919}
920920
921- func setWhiteBlackListPeers (ctx * cli.Context , cfg * p2p.Config ) {
922- flags .CheckExclusive (ctx , PeersWhitelistFlag , PeersBlacklistFlag )
921+ func setAllowlistAndDenylistForPeers (ctx * cli.Context , cfg * p2p.Config ) {
922+ flags .CheckExclusive (ctx , PeersAllowlistFlag , PeersDenylistFlag )
923923
924- // setup whitelist for peers
925- if ctx .IsSet (PeersWhitelistFlag .Name ) {
926- urls := SplitAndTrim (ctx .String (PeersWhitelistFlag .Name ))
927- cfg .WhitePeers = make (map [discover.NodeID ]struct {}, len (urls ))
924+ // setup allowlist for peers
925+ if ctx .IsSet (PeersAllowlistFlag .Name ) {
926+ urls := SplitAndTrim (ctx .String (PeersAllowlistFlag .Name ))
927+ cfg .AllowPeers = make (map [discover.NodeID ]struct {}, len (urls ))
928928 for _ , url := range urls {
929929 if url != "" {
930930 node1 , err1 := discover .HexID (url )
931931 if err1 == nil {
932- cfg .WhitePeers [node1 ] = struct {}{}
933- log .Info ("Add peer to whitelist " , "id" , node1 )
932+ cfg .AllowPeers [node1 ] = struct {}{}
933+ log .Info ("Add peer to allowlist " , "id" , node1 )
934934 continue
935935 }
936936 node2 , err2 := discover .ParseNode (url )
937937 if err2 == nil {
938- cfg .WhitePeers [node2 .ID ] = struct {}{}
939- log .Info ("Add peer to whitelist " , "enode" , url , "id" , node2 .ID )
938+ cfg .AllowPeers [node2 .ID ] = struct {}{}
939+ log .Info ("Add peer to allowlist " , "enode" , url , "id" , node2 .ID )
940940 continue
941941 }
942- log .Crit ("Invalid peer id for whitelist " , "url" , url , "err1" , err1 , "err2" , err2 )
942+ log .Crit ("Invalid peer id for allowlist " , "url" , url , "err1" , err1 , "err2" , err2 )
943943 }
944944 }
945945 }
946946
947- // setup blacklist for peers
948- if ctx .IsSet (PeersBlacklistFlag .Name ) {
949- urls := SplitAndTrim (ctx .String (PeersBlacklistFlag .Name ))
950- cfg .BlackPeers = make (map [discover.NodeID ]struct {}, len (urls ))
947+ // setup denylist for peers
948+ if ctx .IsSet (PeersDenylistFlag .Name ) {
949+ urls := SplitAndTrim (ctx .String (PeersDenylistFlag .Name ))
950+ cfg .DenyPeers = make (map [discover.NodeID ]struct {}, len (urls ))
951951 for _ , url := range urls {
952952 if url != "" {
953953 node1 , err1 := discover .HexID (url )
954954 if err1 == nil {
955- cfg .BlackPeers [node1 ] = struct {}{}
956- log .Info ("Add peer to blacklist " , "id" , node1 )
955+ cfg .DenyPeers [node1 ] = struct {}{}
956+ log .Info ("Add peer to denylist " , "id" , node1 )
957957 continue
958958 }
959959 node2 , err2 := discover .ParseNode (url )
960960 if err2 == nil {
961- cfg .BlackPeers [node2 .ID ] = struct {}{}
962- log .Info ("Add peer to blacklist " , "enode" , url , "id" , node2 .ID )
961+ cfg .DenyPeers [node2 .ID ] = struct {}{}
962+ log .Info ("Add peer to denylist " , "enode" , url , "id" , node2 .ID )
963963 continue
964964 }
965- log .Crit ("Invalid peer id for blacklist " , "url" , url , "err1" , err1 , "err2" , err2 )
965+ log .Crit ("Invalid peer id for denylist " , "url" , url , "err1" , err1 , "err2" , err2 )
966966 }
967967 }
968968 }
969969}
970970
971- // removeBlackPeers removes bootstrap nodes which is in peers blacklist
972- func removeBlackPeers (cfg * p2p.Config ) {
973- if len (cfg .BlackPeers ) == 0 {
971+ // removeDenylistedPeers removes bootstrap nodes which is in peers denylist
972+ func removeDenylistedPeers (cfg * p2p.Config ) {
973+ if len (cfg .DenyPeers ) == 0 {
974974 return
975975 }
976976
977977 filteredNodes := make ([]* discover.Node , 0 , len (cfg .BootstrapNodes ))
978978 for _ , node := range cfg .BootstrapNodes {
979- if _ , ok := cfg .BlackPeers [node .ID ]; ok {
980- log .Info ("Remove black peer" , "enode" , node , "id" , node .ID )
979+ if _ , ok := cfg .DenyPeers [node .ID ]; ok {
980+ log .Info ("Remove denylisted peer" , "enode" , node , "id" , node .ID )
981981 continue
982982 }
983983 filteredNodes = append (filteredNodes , node )
@@ -1280,8 +1280,8 @@ func SetP2PConfig(ctx *cli.Context, cfg *p2p.Config) {
12801280 setNAT (ctx , cfg )
12811281 setListenAddress (ctx , cfg )
12821282 setBootstrapNodes (ctx , cfg )
1283- setWhiteBlackListPeers (ctx , cfg )
1284- removeBlackPeers (cfg )
1283+ setAllowlistAndDenylistForPeers (ctx , cfg )
1284+ removeDenylistedPeers (cfg )
12851285 // setBootstrapNodesV5(ctx, cfg)
12861286
12871287 if ctx .IsSet (MaxPeersFlag .Name ) {
0 commit comments