package main import ( "bytes" "encoding/base64" "fmt" context "github.com/jbenet/go-ipfs/Godeps/_workspace/src/code.google.com/p/go.net/context" cmds "github.com/jbenet/go-ipfs/commands" core "github.com/jbenet/go-ipfs/core" corecmds "github.com/jbenet/go-ipfs/core/commands" coreunix "github.com/jbenet/go-ipfs/core/coreunix" ipns "github.com/jbenet/go-ipfs/fuse/ipns" ci "github.com/jbenet/go-ipfs/p2p/crypto" peer "github.com/jbenet/go-ipfs/p2p/peer" config "github.com/jbenet/go-ipfs/repo/config" fsrepo "github.com/jbenet/go-ipfs/repo/fsrepo" u "github.com/jbenet/go-ipfs/util" debugerror "github.com/jbenet/go-ipfs/util/debugerror" ) const nBitsForKeypairDefault = 4096 var initCmd = &cmds.Command{ Helptext: cmds.HelpText{ Tagline: "Initializes IPFS config file", ShortDescription: "Initializes IPFS configuration files and generates a new keypair.", }, Options: []cmds.Option{ cmds.IntOption("bits", "b", "Number of bits to use in the generated RSA private key (defaults to 4096)"), cmds.StringOption("passphrase", "p", "Passphrase for encrypting the private key"), cmds.BoolOption("force", "f", "Overwrite existing config (if it exists)"), // TODO need to decide whether to expose the override as a file or a // directory. That is: should we allow the user to also specify the // name of the file? // TODO cmds.StringOption("event-logs", "l", "Location for machine-readable event logs"), }, Run: func(req cmds.Request, res cmds.Response) { force, _, err := req.Option("f").Bool() // if !found, it's okay force == false if err != nil { res.SetError(err, cmds.ErrNormal) return } nBitsForKeypair, bitsOptFound, err := req.Option("b").Int() if err != nil { res.SetError(err, cmds.ErrNormal) return } if !bitsOptFound { nBitsForKeypair = nBitsForKeypairDefault } output, err := doInit(req.Context().ConfigRoot, force, nBitsForKeypair) if err != nil { res.SetError(err, cmds.ErrNormal) return } res.SetOutput(output) }, } var errRepoExists = debugerror.New(`ipfs configuration file already exists! Reinitializing would overwrite your keys. (use -f to force overwrite) `) var welcomeMsg = `Hello and Welcome to IPFS! ██╗██████╗ ███████╗███████╗ ██║██╔══██╗██╔════╝██╔════╝ ██║██████╔╝█████╗ ███████╗ ██║██╔═══╝ ██╔══╝ ╚════██║ ██║██║ ██║ ███████║ ╚═╝╚═╝ ╚═╝ ╚══════╝ If you're seeing this, you have successfully installed IPFS and are now interfacing with the ipfs merkledag! For a short demo of what you can do, enter 'ipfs tour' ` func initWithDefaults(repoRoot string) error { _, err := doInit(repoRoot, false, nBitsForKeypairDefault) return debugerror.Wrap(err) } func doInit(repoRoot string, force bool, nBitsForKeypair int) (interface{}, error) { u.POut("initializing ipfs node at %s\n", repoRoot) if fsrepo.IsInitialized(repoRoot) && !force { return nil, errRepoExists } conf, err := initConfig(nBitsForKeypair) if err != nil { return nil, err } if fsrepo.IsInitialized(repoRoot) { if err := fsrepo.Remove(repoRoot); err != nil { return nil, err } } if err := fsrepo.Init(repoRoot, conf); err != nil { return nil, err } err = addTheWelcomeFile(repoRoot) if err != nil { return nil, err } err = initializeIpnsKeyspace(repoRoot) if err != nil { return nil, err } return nil, nil } // addTheWelcomeFile adds a file containing the welcome message to the newly // minted node. func addTheWelcomeFile(repoRoot string) error { ctx, cancel := context.WithCancel(context.Background()) defer cancel() r := fsrepo.At(repoRoot) if err := r.Open(); err != nil { // NB: repo is owned by the node return err } nd, err := core.NewIPFSNode(ctx, core.Offline(r)) if err != nil { return err } defer nd.Close() // Set up default file reader := bytes.NewBufferString(welcomeMsg) k, err := coreunix.Add(nd, reader) if err != nil { return fmt.Errorf("failed to write test file: %s", err) } fmt.Printf("\nto get started, enter: ipfs cat %s\n", k) return nil } func initializeIpnsKeyspace(repoRoot string) error { ctx, cancel := context.WithCancel(context.Background()) defer cancel() r := fsrepo.At(repoRoot) if err := r.Open(); err != nil { // NB: repo is owned by the node return err } nd, err := core.NewIPFSNode(ctx, core.Offline(r)) if err != nil { return err } defer nd.Close() err = nd.SetupOfflineRouting() if err != nil { return err } return ipns.InitializeKeyspace(nd, nd.PrivateKey) } func datastoreConfig() (*config.Datastore, error) { dspath, err := config.DataStorePath("") if err != nil { return nil, err } return &config.Datastore{ Path: dspath, Type: "leveldb", }, nil } func initConfig(nBitsForKeypair int) (*config.Config, error) { ds, err := datastoreConfig() if err != nil { return nil, err } identity, err := identityConfig(nBitsForKeypair) if err != nil { return nil, err } bootstrapPeers, err := corecmds.DefaultBootstrapPeers() if err != nil { return nil, err } conf := &config.Config{ // setup the node's default addresses. // Note: two swarm listen addrs, one tcp, one utp. Addresses: config.Addresses{ Swarm: []string{ "/ip4/0.0.0.0/tcp/4001", // "/ip4/0.0.0.0/udp/4002/utp", // disabled for now. }, API: "/ip4/127.0.0.1/tcp/5001", }, Bootstrap: bootstrapPeers, Datastore: *ds, Identity: identity, // setup the node mount points. Mounts: config.Mounts{ IPFS: "/ipfs", IPNS: "/ipns", }, // tracking ipfs version used to generate the init folder and adding // update checker default setting. Version: config.VersionDefaultValue(), } return conf, nil } // identityConfig initializes a new identity. func identityConfig(nbits int) (config.Identity, error) { // TODO guard higher up ident := config.Identity{} if nbits < 1024 { return ident, debugerror.New("Bitsize less than 1024 is considered unsafe.") } fmt.Printf("generating %v-bit RSA keypair...", nbits) sk, pk, err := ci.GenerateKeyPair(ci.RSA, nbits) if err != nil { return ident, err } fmt.Printf("done\n") // currently storing key unencrypted. in the future we need to encrypt it. // TODO(security) skbytes, err := sk.Bytes() if err != nil { return ident, err } ident.PrivKey = base64.StdEncoding.EncodeToString(skbytes) id, err := peer.IDFromPublicKey(pk) if err != nil { return ident, err } ident.PeerID = id.Pretty() fmt.Printf("peer identity: %s\n", ident.PeerID) return ident, nil }