Skip to content

Commit 50210d9

Browse files
authored
refactor(all): remove term whitelist and blacklist (#1994)
1 parent 85f2beb commit 50210d9

27 files changed

+172
-171
lines changed

cmd/XDC/main.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,8 +61,8 @@ var (
6161
utils.IdentityFlag,
6262
utils.UnlockedAccountFlag,
6363
utils.PasswordFileFlag,
64-
utils.PeersWhitelistFlag,
65-
utils.PeersBlacklistFlag,
64+
utils.PeersAllowlistFlag,
65+
utils.PeersDenylistFlag,
6666
utils.BootnodesFlag,
6767
utils.BootnodesV4Flag,
6868
utils.BootnodesV5Flag,

cmd/puppeth/module_ethstats.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -157,7 +157,7 @@ func checkEthstats(client *sshClient, network string) (*ethstatsInfos, error) {
157157
if port != 80 && port != 443 {
158158
config += fmt.Sprintf(":%d", port)
159159
}
160-
// Retrieve the IP blacklist
160+
// Retrieve the IP denylist
161161
banned := strings.Split(infos.envvars["BANNED"], ",")
162162

163163
// Run a sanity check to see if the port is reachable

cmd/puppeth/wizard_ethstats.go

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -63,20 +63,20 @@ func (w *wizard) deployEthstats() {
6363
fmt.Printf("What should be the secret password for the API? (default = %s)\n", infos.secret)
6464
infos.secret = w.readDefaultString(infos.secret)
6565
}
66-
// Gather any blacklists to ban from reporting
66+
// Gather any denylist to ban from reporting
6767
if existed {
6868
fmt.Println()
69-
fmt.Printf("Keep existing IP %v blacklist (y/n)? (default = yes)\n", infos.banned)
69+
fmt.Printf("Keep existing IP %v denylist (y/n)? (default = yes)\n", infos.banned)
7070
if w.readDefaultString("y") != "y" {
7171
// The user might want to clear the entire list, although generally probably not
7272
fmt.Println()
73-
fmt.Printf("Clear out blacklist and start over (y/n)? (default = no)\n")
73+
fmt.Printf("Clear out denylist and start over (y/n)? (default = no)\n")
7474
if w.readDefaultString("n") != "n" {
7575
infos.banned = nil
7676
}
7777
// Offer the user to explicitly add/remove certain IP addresses
7878
fmt.Println()
79-
fmt.Println("Which additional IP addresses should be blacklisted?")
79+
fmt.Println("Which additional IP addresses should be denylisted?")
8080
for {
8181
if ip := w.readIPAddress(); ip != "" {
8282
infos.banned = append(infos.banned, ip)
@@ -85,7 +85,7 @@ func (w *wizard) deployEthstats() {
8585
break
8686
}
8787
fmt.Println()
88-
fmt.Println("Which IP addresses should not be blacklisted?")
88+
fmt.Println("Which IP addresses should not be denylisted?")
8989
for {
9090
if ip := w.readIPAddress(); ip != "" {
9191
for i, addr := range infos.banned {

cmd/utils/flags.go

Lines changed: 33 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -629,15 +629,15 @@ var (
629629
Value: 30303,
630630
Category: flags.NetworkingCategory,
631631
}
632-
PeersWhitelistFlag = &cli.StringFlag{
633-
Name: "peers-whitelist",
634-
Usage: "Comma separated NodeID or enode URLs for peer whitelist (only connect to them)",
632+
PeersAllowlistFlag = &cli.StringFlag{
633+
Name: "peers-allowlist",
634+
Usage: "Comma separated NodeID or enode URLs for peer allowlist (only connect to them)",
635635
Value: "",
636636
Category: flags.NetworkingCategory,
637637
}
638-
PeersBlacklistFlag = &cli.StringFlag{
639-
Name: "peers-blacklist",
640-
Usage: "Comma separated NodeID or enode URLs for peer blacklist (will not connect to them)",
638+
PeersDenylistFlag = &cli.StringFlag{
639+
Name: "peers-denylist",
640+
Usage: "Comma separated NodeID or enode URLs for peer denylist (will not connect to them)",
641641
Value: "",
642642
Category: flags.NetworkingCategory,
643643
}
@@ -918,66 +918,66 @@ func setNodeUserIdent(ctx *cli.Context, cfg *node.Config) {
918918
}
919919
}
920920

921-
func setWhiteBlackListPeers(ctx *cli.Context, cfg *p2p.Config) {
922-
flags.CheckExclusive(ctx, PeersWhitelistFlag, PeersBlacklistFlag)
921+
func setAllowlistAndDenylistForPeers(ctx *cli.Context, cfg *p2p.Config) {
922+
flags.CheckExclusive(ctx, PeersAllowlistFlag, PeersDenylistFlag)
923923

924-
// setup whitelist for peers
925-
if ctx.IsSet(PeersWhitelistFlag.Name) {
926-
urls := SplitAndTrim(ctx.String(PeersWhitelistFlag.Name))
927-
cfg.WhitePeers = make(map[discover.NodeID]struct{}, len(urls))
924+
// setup allowlist for peers
925+
if ctx.IsSet(PeersAllowlistFlag.Name) {
926+
urls := SplitAndTrim(ctx.String(PeersAllowlistFlag.Name))
927+
cfg.AllowPeers = make(map[discover.NodeID]struct{}, len(urls))
928928
for _, url := range urls {
929929
if url != "" {
930930
node1, err1 := discover.HexID(url)
931931
if err1 == nil {
932-
cfg.WhitePeers[node1] = struct{}{}
933-
log.Info("Add peer to whitelist", "id", node1)
932+
cfg.AllowPeers[node1] = struct{}{}
933+
log.Info("Add peer to allowlist", "id", node1)
934934
continue
935935
}
936936
node2, err2 := discover.ParseNode(url)
937937
if err2 == nil {
938-
cfg.WhitePeers[node2.ID] = struct{}{}
939-
log.Info("Add peer to whitelist", "enode", url, "id", node2.ID)
938+
cfg.AllowPeers[node2.ID] = struct{}{}
939+
log.Info("Add peer to allowlist", "enode", url, "id", node2.ID)
940940
continue
941941
}
942-
log.Crit("Invalid peer id for whitelist", "url", url, "err1", err1, "err2", err2)
942+
log.Crit("Invalid peer id for allowlist", "url", url, "err1", err1, "err2", err2)
943943
}
944944
}
945945
}
946946

947-
// setup blacklist for peers
948-
if ctx.IsSet(PeersBlacklistFlag.Name) {
949-
urls := SplitAndTrim(ctx.String(PeersBlacklistFlag.Name))
950-
cfg.BlackPeers = make(map[discover.NodeID]struct{}, len(urls))
947+
// setup denylist for peers
948+
if ctx.IsSet(PeersDenylistFlag.Name) {
949+
urls := SplitAndTrim(ctx.String(PeersDenylistFlag.Name))
950+
cfg.DenyPeers = make(map[discover.NodeID]struct{}, len(urls))
951951
for _, url := range urls {
952952
if url != "" {
953953
node1, err1 := discover.HexID(url)
954954
if err1 == nil {
955-
cfg.BlackPeers[node1] = struct{}{}
956-
log.Info("Add peer to blacklist", "id", node1)
955+
cfg.DenyPeers[node1] = struct{}{}
956+
log.Info("Add peer to denylist", "id", node1)
957957
continue
958958
}
959959
node2, err2 := discover.ParseNode(url)
960960
if err2 == nil {
961-
cfg.BlackPeers[node2.ID] = struct{}{}
962-
log.Info("Add peer to blacklist", "enode", url, "id", node2.ID)
961+
cfg.DenyPeers[node2.ID] = struct{}{}
962+
log.Info("Add peer to denylist", "enode", url, "id", node2.ID)
963963
continue
964964
}
965-
log.Crit("Invalid peer id for blacklist", "url", url, "err1", err1, "err2", err2)
965+
log.Crit("Invalid peer id for denylist", "url", url, "err1", err1, "err2", err2)
966966
}
967967
}
968968
}
969969
}
970970

971-
// removeBlackPeers removes bootstrap nodes which is in peers blacklist
972-
func removeBlackPeers(cfg *p2p.Config) {
973-
if len(cfg.BlackPeers) == 0 {
971+
// removeDenylistedPeers removes bootstrap nodes which is in peers denylist
972+
func removeDenylistedPeers(cfg *p2p.Config) {
973+
if len(cfg.DenyPeers) == 0 {
974974
return
975975
}
976976

977977
filteredNodes := make([]*discover.Node, 0, len(cfg.BootstrapNodes))
978978
for _, node := range cfg.BootstrapNodes {
979-
if _, ok := cfg.BlackPeers[node.ID]; ok {
980-
log.Info("Remove black peer", "enode", node, "id", node.ID)
979+
if _, ok := cfg.DenyPeers[node.ID]; ok {
980+
log.Info("Remove denylisted peer", "enode", node, "id", node.ID)
981981
continue
982982
}
983983
filteredNodes = append(filteredNodes, node)
@@ -1280,8 +1280,8 @@ func SetP2PConfig(ctx *cli.Context, cfg *p2p.Config) {
12801280
setNAT(ctx, cfg)
12811281
setListenAddress(ctx, cfg)
12821282
setBootstrapNodes(ctx, cfg)
1283-
setWhiteBlackListPeers(ctx, cfg)
1284-
removeBlackPeers(cfg)
1283+
setAllowlistAndDenylistForPeers(ctx, cfg)
1284+
removeDenylistedPeers(cfg)
12851285
// setBootstrapNodesV5(ctx, cfg)
12861286

12871287
if ctx.IsSet(MaxPeersFlag.Name) {

common/constants.all.go

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -38,9 +38,9 @@ var (
3838
)
3939

4040
type constant struct {
41-
chainID uint64
42-
blackListHFNumber uint64
43-
maxMasternodesV2 int // Last v1 masternodes
41+
chainID uint64
42+
denylistHFNumber uint64
43+
maxMasternodesV2 int // Last v1 masternodes
4444

4545
tip2019Block *big.Int
4646
tipSigning *big.Int
@@ -75,13 +75,13 @@ type constant struct {
7575

7676
ignoreSignerCheckBlockArray map[uint64]struct{}
7777

78-
blacklist map[Address]struct{}
78+
denylist map[Address]struct{}
7979
}
8080

8181
// variables for specific networks, copy values from mainnet constant to pass tests
8282
var (
83-
BlackListHFNumber = MainnetConstant.blackListHFNumber
84-
MaxMasternodesV2 = MainnetConstant.maxMasternodesV2 // Last v1 masternodes
83+
DenylistHFNumber = MainnetConstant.denylistHFNumber
84+
MaxMasternodesV2 = MainnetConstant.maxMasternodesV2 // Last v1 masternodes
8585

8686
TIP2019Block = MainnetConstant.tip2019Block
8787
TIPSigning = MainnetConstant.tipSigning
@@ -114,19 +114,19 @@ var (
114114
LendingRegistrationSMC = MainnetConstant.lendingRegistrationSMC
115115

116116
ignoreSignerCheckBlockArray = MainnetConstant.ignoreSignerCheckBlockArray
117-
blacklist = MainnetConstant.blacklist
117+
denylist = MainnetConstant.denylist
118118
)
119119

120120
func IsIgnoreSignerCheckBlock(blockNumber uint64) bool {
121121
_, ok := ignoreSignerCheckBlockArray[blockNumber]
122122
return ok
123123
}
124124

125-
func IsInBlacklist(address *Address) bool {
125+
func IsInDenylist(address *Address) bool {
126126
if address == nil {
127127
return false
128128
}
129-
_, ok := blacklist[*address]
129+
_, ok := denylist[*address]
130130
return ok
131131
}
132132

@@ -147,7 +147,7 @@ func CopyConstants(chainID uint64) {
147147
}
148148

149149
MaxMasternodesV2 = c.maxMasternodesV2
150-
BlackListHFNumber = c.blackListHFNumber
150+
DenylistHFNumber = c.denylistHFNumber
151151
TIP2019Block = c.tip2019Block
152152
TIPSigning = c.tipSigning
153153
TIPRandomize = c.tipRandomize
@@ -181,6 +181,6 @@ func CopyConstants(chainID uint64) {
181181
clear(ignoreSignerCheckBlockArray)
182182
maps.Copy(ignoreSignerCheckBlockArray, c.ignoreSignerCheckBlockArray)
183183

184-
clear(blacklist)
185-
maps.Copy(blacklist, c.blacklist)
184+
clear(denylist)
185+
maps.Copy(denylist, c.denylist)
186186
}

common/constants.devnet.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,9 @@ import (
66
)
77

88
var DevnetConstant = constant{
9-
chainID: 551,
10-
blackListHFNumber: 0,
11-
maxMasternodesV2: 108,
9+
chainID: 551,
10+
denylistHFNumber: 0,
11+
maxMasternodesV2: 108,
1212

1313
tip2019Block: big.NewInt(0),
1414
tipSigning: big.NewInt(0),
@@ -48,7 +48,7 @@ var DevnetConstant = constant{
4848
28270800: {},
4949
},
5050

51-
blacklist: map[Address]struct{}{
51+
denylist: map[Address]struct{}{
5252
HexToAddress("0x5248bfb72fd4f234e062d3e9bb76f08643004fcd"): {},
5353
HexToAddress("0x5ac26105b35ea8935be382863a70281ec7a985e9"): {},
5454
HexToAddress("0x09c4f991a41e7ca0645d7dfbfee160b55e562ea4"): {},

common/constants.local.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,9 @@ import (
66
)
77

88
var localConstant = constant{
9-
chainID: 5151,
10-
maxMasternodesV2: 108,
11-
blackListHFNumber: 0,
9+
chainID: 5151,
10+
maxMasternodesV2: 108,
11+
denylistHFNumber: 0,
1212

1313
tip2019Block: big.NewInt(0),
1414
tipSigning: big.NewInt(0),
@@ -43,5 +43,5 @@ var localConstant = constant{
4343

4444
ignoreSignerCheckBlockArray: map[uint64]struct{}{},
4545

46-
blacklist: map[Address]struct{}{},
46+
denylist: map[Address]struct{}{},
4747
}

common/constants.mainnet.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,9 @@ import (
66
)
77

88
var MainnetConstant = constant{
9-
chainID: 50,
10-
blackListHFNumber: 38383838,
11-
maxMasternodesV2: 108,
9+
chainID: 50,
10+
denylistHFNumber: 38383838,
11+
maxMasternodesV2: 108,
1212

1313
tip2019Block: big.NewInt(1),
1414
tipSigning: big.NewInt(3000000),
@@ -48,7 +48,7 @@ var MainnetConstant = constant{
4848
28270800: {},
4949
},
5050

51-
blacklist: map[Address]struct{}{
51+
denylist: map[Address]struct{}{
5252
HexToAddress("0x5248bfb72fd4f234e062d3e9bb76f08643004fcd"): {},
5353
HexToAddress("0x5ac26105b35ea8935be382863a70281ec7a985e9"): {},
5454
HexToAddress("0x09c4f991a41e7ca0645d7dfbfee160b55e562ea4"): {},

common/constants.testnet.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,9 @@ import (
66
)
77

88
var TestnetConstant = constant{
9-
chainID: 51,
10-
blackListHFNumber: 23779191,
11-
maxMasternodesV2: 15,
9+
chainID: 51,
10+
denylistHFNumber: 23779191,
11+
maxMasternodesV2: 15,
1212

1313
tip2019Block: big.NewInt(1),
1414
tipSigning: big.NewInt(3000000),
@@ -48,7 +48,7 @@ var TestnetConstant = constant{
4848
28270800: {},
4949
},
5050

51-
blacklist: map[Address]struct{}{
51+
denylist: map[Address]struct{}{
5252
HexToAddress("0x5248bfb72fd4f234e062d3e9bb76f08643004fcd"): {},
5353
HexToAddress("0x5ac26105b35ea8935be382863a70281ec7a985e9"): {},
5454
HexToAddress("0x09c4f991a41e7ca0645d7dfbfee160b55e562ea4"): {},

core/blockchain.go

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1581,8 +1581,8 @@ func (bc *BlockChain) insertChain(chain types.Blocks, verifySeals bool) (int, []
15811581
}
15821582
// If the header is a banned one, straight out abort
15831583
if BadHashes[block.Hash()] {
1584-
bc.reportBlock(block, nil, ErrBlacklistedHash)
1585-
return it.index, events, coalescedLogs, ErrBlacklistedHash
1584+
bc.reportBlock(block, nil, ErrDenylistedHash)
1585+
return it.index, events, coalescedLogs, ErrDenylistedHash
15861586
}
15871587
// Retrieve the parent block and it's state to execute on top
15881588
start := time.Now()
@@ -1942,12 +1942,12 @@ func (bc *BlockChain) getResultBlock(block *types.Block, verifiedM2 bool) (*Resu
19421942
// If the chain is terminating, stop processing blocks
19431943
if bc.insertStopped() {
19441944
log.Debug("Premature abort during blocks processing")
1945-
return nil, ErrBlacklistedHash
1945+
return nil, errInsertionInterrupted
19461946
}
19471947
// If the header is a banned one, straight out abort
19481948
if BadHashes[block.Hash()] {
1949-
bc.reportBlock(block, nil, ErrBlacklistedHash)
1950-
return nil, ErrBlacklistedHash
1949+
bc.reportBlock(block, nil, ErrDenylistedHash)
1950+
return nil, ErrDenylistedHash
19511951
}
19521952
// Wait for the block's verification to complete
19531953
bstart := time.Now()

0 commit comments

Comments
 (0)