mirror of
https://github.com/ipfs/kubo.git
synced 2025-08-05 19:02:21 +08:00
795 lines
22 KiB
Go
795 lines
22 KiB
Go
/*
|
|
Package core implements the IpfsNode object and related methods.
|
|
|
|
Packages underneath core/ provide a (relatively) stable, low-level API
|
|
to carry out most IPFS-related tasks. For more details on the other
|
|
interfaces and how core/... fits into the bigger IPFS picture, see:
|
|
|
|
$ godoc github.com/ipfs/go-ipfs
|
|
*/
|
|
package core
|
|
|
|
import (
|
|
"bytes"
|
|
"context"
|
|
"errors"
|
|
"fmt"
|
|
"io"
|
|
"io/ioutil"
|
|
"net"
|
|
"os"
|
|
"strings"
|
|
"time"
|
|
|
|
bstore "github.com/ipfs/go-ipfs/blocks/blockstore"
|
|
bserv "github.com/ipfs/go-ipfs/blockservice"
|
|
diag "github.com/ipfs/go-ipfs/diagnostics"
|
|
exchange "github.com/ipfs/go-ipfs/exchange"
|
|
bitswap "github.com/ipfs/go-ipfs/exchange/bitswap"
|
|
bsnet "github.com/ipfs/go-ipfs/exchange/bitswap/network"
|
|
rp "github.com/ipfs/go-ipfs/exchange/reprovide"
|
|
filestore "github.com/ipfs/go-ipfs/filestore"
|
|
mount "github.com/ipfs/go-ipfs/fuse/mount"
|
|
merkledag "github.com/ipfs/go-ipfs/merkledag"
|
|
mfs "github.com/ipfs/go-ipfs/mfs"
|
|
namesys "github.com/ipfs/go-ipfs/namesys"
|
|
ipnsrp "github.com/ipfs/go-ipfs/namesys/republisher"
|
|
path "github.com/ipfs/go-ipfs/path"
|
|
pin "github.com/ipfs/go-ipfs/pin"
|
|
repo "github.com/ipfs/go-ipfs/repo"
|
|
config "github.com/ipfs/go-ipfs/repo/config"
|
|
nilrouting "github.com/ipfs/go-ipfs/routing/none"
|
|
offroute "github.com/ipfs/go-ipfs/routing/offline"
|
|
ft "github.com/ipfs/go-ipfs/unixfs"
|
|
|
|
pstore "gx/ipfs/QmNUVzEjq3XWJ89hegahPvyfJbTXgTaom48pLb7YBD9gHQ/go-libp2p-peerstore"
|
|
ic "gx/ipfs/QmP1DfoUjiWH2ZBo1PBH6FupdBucbDepx3HpWmEY6JMUpY/go-libp2p-crypto"
|
|
ipnet "gx/ipfs/QmPsBptED6X43GYg3347TAUruN3UfsAhaGTP9xbinYX7uf/go-libp2p-interface-pnet"
|
|
mplex "gx/ipfs/QmQ3UABWTgK78utKeiVXaH9BrjC7Ydn1pRuwqnWHT3p4zh/go-smux-multiplex"
|
|
dht "gx/ipfs/QmQcRLisUbREko56ThfgzdBorMGNfNjgqzvwuPPr1jFw6A/go-libp2p-kad-dht"
|
|
mssmux "gx/ipfs/QmRVYfZ7tWNHPBzWiG6KWGzvT2hcGems8srihsQE29x1U5/go-smux-multistream"
|
|
ds "gx/ipfs/QmRWDav6mzWseLWeYfVd5fvUKiVe9xNH29YfMF438fG364/go-datastore"
|
|
discovery "gx/ipfs/QmRai5yZNL67pWCoznW7sBdFnqZrFULuJ5w8KhmRyhdgN4/go-libp2p/p2p/discovery"
|
|
p2pbhost "gx/ipfs/QmRai5yZNL67pWCoznW7sBdFnqZrFULuJ5w8KhmRyhdgN4/go-libp2p/p2p/host/basic"
|
|
rhost "gx/ipfs/QmRai5yZNL67pWCoznW7sBdFnqZrFULuJ5w8KhmRyhdgN4/go-libp2p/p2p/host/routed"
|
|
identify "gx/ipfs/QmRai5yZNL67pWCoznW7sBdFnqZrFULuJ5w8KhmRyhdgN4/go-libp2p/p2p/protocol/identify"
|
|
ping "gx/ipfs/QmRai5yZNL67pWCoznW7sBdFnqZrFULuJ5w8KhmRyhdgN4/go-libp2p/p2p/protocol/ping"
|
|
goprocess "gx/ipfs/QmSF8fPo3jgVBAy8fpdjjYqgG87dkJgUprRBHRd2tmfgpP/goprocess"
|
|
mamask "gx/ipfs/QmSMZwvs3n4GBikZ7hKzT17c3bk65FmyZo2JqtJ16swqCv/multiaddr-filter"
|
|
logging "gx/ipfs/QmSpJByNKFX1sCsHBEp3R73FL4NF6FnQTEGyNAXHm2GS52/go-log"
|
|
b58 "gx/ipfs/QmT8rehPR3F6bmwL6zjUN8XpiDBFFpMP2myPdC6ApsWfJf/go-base58"
|
|
pnet "gx/ipfs/QmUVtboYWnhKRrQ8Ny34Zz3qchUxqjypy4ahjFg9kc6iy7/go-libp2p-pnet"
|
|
metrics "gx/ipfs/QmVMbSdq6PbznPC83SENVhH7JZn3BqqxkKgrHJFN2RuARf/go-libp2p-metrics"
|
|
u "gx/ipfs/QmWbjfz3u6HkAdPh34dgPchGbQjob6LXLhAeCGii2TX69n/go-ipfs-util"
|
|
floodsub "gx/ipfs/QmYPKo97ssdv3Bsk9sRAS5ZjahGg9Stzys3vybu3r7VuB5/floodsub"
|
|
cid "gx/ipfs/QmYhQaCYEcaPPjxJX7YcPcVKkQfRy6sJ7B3XmGFk82XYdQ/go-cid"
|
|
routing "gx/ipfs/QmafuecpeZp3k3sHJ5mUARHd4795revuadECQMkmHB8LfW/go-libp2p-routing"
|
|
addrutil "gx/ipfs/QmbH3urJHTrZSUETgvQRriWM6mMFqyNSwCqnhknxfSGVWv/go-addr-util"
|
|
yamux "gx/ipfs/Qmbn7RYyWzBVXiUp9jZ1dA4VADHy9DtS7iZLwfhEUQvm3U/go-smux-yamux"
|
|
p2phost "gx/ipfs/QmcyNeWPsoFGxThGpV8JnJdfUNankKhWCTrbrcFRQda4xR/go-libp2p-host"
|
|
ma "gx/ipfs/QmcyqRMCAXVtYPS4DiBrA7sezL9rRGfW8Ctx7cywL4TXJj/go-multiaddr"
|
|
peer "gx/ipfs/QmdS9KpbDyPrieswibZhkod1oXqRwZJrUPzxCofAMWpFGq/go-libp2p-peer"
|
|
smux "gx/ipfs/QmeZBgYBHvxMukGK5ojg28BCNLB9SeXqT7XXg6o7r2GbJy/go-stream-muxer"
|
|
swarm "gx/ipfs/Qmeo7oJxR65PLPx68KPFi8rjzcEmmWN2dL66fPuq9nVMv8/go-libp2p-swarm"
|
|
)
|
|
|
|
const IpnsValidatorTag = "ipns"
|
|
const kSizeBlockstoreWriteCache = 100
|
|
const kReprovideFrequency = time.Hour * 12
|
|
const discoveryConnTimeout = time.Second * 30
|
|
|
|
var log = logging.Logger("core")
|
|
|
|
type mode int
|
|
|
|
const (
|
|
// zero value is not a valid mode, must be explicitly set
|
|
invalidMode mode = iota
|
|
localMode
|
|
offlineMode
|
|
onlineMode
|
|
)
|
|
|
|
func init() {
|
|
identify.ClientVersion = "go-ipfs/" + config.CurrentVersionNumber + "/" + config.CurrentCommit
|
|
}
|
|
|
|
// IpfsNode is IPFS Core module. It represents an IPFS instance.
|
|
type IpfsNode struct {
|
|
|
|
// Self
|
|
Identity peer.ID // the local node's identity
|
|
|
|
Repo repo.Repo
|
|
|
|
// Local node
|
|
Pinning pin.Pinner // the pinning manager
|
|
Mounts Mounts // current mount state, if any.
|
|
PrivateKey ic.PrivKey // the local node's private Key
|
|
PNetFingerpint []byte // fingerprint of private network
|
|
|
|
// Services
|
|
Peerstore pstore.Peerstore // storage for other Peer instances
|
|
Blockstore bstore.GCBlockstore // the block store (lower level)
|
|
Filestore *filestore.Filestore // the filestore blockstore
|
|
BaseBlocks bstore.Blockstore // the raw blockstore, no filestore wrapping
|
|
GCLocker bstore.GCLocker // the locker used to protect the blockstore during gc
|
|
Blocks bserv.BlockService // the block service, get/add blocks.
|
|
DAG merkledag.DAGService // the merkle dag service, get/add objects.
|
|
Resolver *path.Resolver // the path resolution system
|
|
Reporter metrics.Reporter
|
|
Discovery discovery.Service
|
|
FilesRoot *mfs.Root
|
|
|
|
// Online
|
|
PeerHost p2phost.Host // the network host (server+client)
|
|
Bootstrapper io.Closer // the periodic bootstrapper
|
|
Routing routing.IpfsRouting // the routing system. recommend ipfs-dht
|
|
Exchange exchange.Interface // the block exchange + strategy (bitswap)
|
|
Namesys namesys.NameSystem // the name system, resolves paths to hashes
|
|
Diagnostics *diag.Diagnostics // the diagnostics service
|
|
Ping *ping.PingService
|
|
Reprovider *rp.Reprovider // the value reprovider system
|
|
IpnsRepub *ipnsrp.Republisher
|
|
|
|
Floodsub *floodsub.PubSub
|
|
|
|
proc goprocess.Process
|
|
ctx context.Context
|
|
|
|
mode mode
|
|
localModeSet bool
|
|
}
|
|
|
|
// Mounts defines what the node's mount state is. This should
|
|
// perhaps be moved to the daemon or mount. It's here because
|
|
// it needs to be accessible across daemon requests.
|
|
type Mounts struct {
|
|
Ipfs mount.Mount
|
|
Ipns mount.Mount
|
|
}
|
|
|
|
func (n *IpfsNode) startOnlineServices(ctx context.Context, routingOption RoutingOption, hostOption HostOption, do DiscoveryOption, pubsub, mplex bool) error {
|
|
|
|
if n.PeerHost != nil { // already online.
|
|
return errors.New("node already online")
|
|
}
|
|
|
|
// load private key
|
|
if err := n.LoadPrivateKey(); err != nil {
|
|
return err
|
|
}
|
|
|
|
// get undialable addrs from config
|
|
cfg, err := n.Repo.Config()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
var addrfilter []*net.IPNet
|
|
for _, s := range cfg.Swarm.AddrFilters {
|
|
f, err := mamask.NewMask(s)
|
|
if err != nil {
|
|
return fmt.Errorf("incorrectly formatted address filter in config: %s", s)
|
|
}
|
|
addrfilter = append(addrfilter, f)
|
|
}
|
|
|
|
if !cfg.Swarm.DisableBandwidthMetrics {
|
|
// Set reporter
|
|
n.Reporter = metrics.NewBandwidthCounter()
|
|
}
|
|
|
|
tpt := makeSmuxTransport(mplex)
|
|
|
|
swarmkey, err := n.Repo.SwarmKey()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
var protec ipnet.Protector
|
|
if swarmkey != nil {
|
|
protec, err = pnet.NewProtector(bytes.NewReader(swarmkey))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
n.PNetFingerpint = protec.Fingerprint()
|
|
go func() {
|
|
t := time.NewTicker(30 * time.Second)
|
|
<-t.C // swallow one tick
|
|
for {
|
|
select {
|
|
case <-t.C:
|
|
if ph := n.PeerHost; ph != nil {
|
|
if len(ph.Network().Peers()) == 0 {
|
|
log.Warning("We are in private network and have no peers.")
|
|
log.Warning("This might be configuration mistake.")
|
|
}
|
|
}
|
|
case <-n.Process().Closing():
|
|
t.Stop()
|
|
return
|
|
}
|
|
}
|
|
}()
|
|
}
|
|
|
|
peerhost, err := hostOption(ctx, n.Identity, n.Peerstore, n.Reporter,
|
|
addrfilter, tpt, protec, &ConstructPeerHostOpts{DisableNatPortMap: cfg.Swarm.DisableNatPortMap})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := n.startOnlineServicesWithHost(ctx, peerhost, routingOption); err != nil {
|
|
return err
|
|
}
|
|
|
|
// Ok, now we're ready to listen.
|
|
if err := startListening(ctx, n.PeerHost, cfg); err != nil {
|
|
return err
|
|
}
|
|
|
|
n.Reprovider = rp.NewReprovider(n.Routing, n.Blockstore)
|
|
|
|
if cfg.Reprovider.Interval != "0" {
|
|
interval := kReprovideFrequency
|
|
if cfg.Reprovider.Interval != "" {
|
|
dur, err := time.ParseDuration(cfg.Reprovider.Interval)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
interval = dur
|
|
}
|
|
|
|
go n.Reprovider.ProvideEvery(ctx, interval)
|
|
}
|
|
|
|
if pubsub {
|
|
n.Floodsub = floodsub.NewFloodSub(ctx, peerhost)
|
|
}
|
|
|
|
// setup local discovery
|
|
if do != nil {
|
|
service, err := do(ctx, n.PeerHost)
|
|
if err != nil {
|
|
log.Error("mdns error: ", err)
|
|
} else {
|
|
service.RegisterNotifee(n)
|
|
n.Discovery = service
|
|
}
|
|
}
|
|
|
|
return n.Bootstrap(DefaultBootstrapConfig)
|
|
}
|
|
|
|
func makeSmuxTransport(mplexExp bool) smux.Transport {
|
|
mstpt := mssmux.NewBlankTransport()
|
|
|
|
ymxtpt := &yamux.Transport{
|
|
AcceptBacklog: 8192,
|
|
ConnectionWriteTimeout: time.Second * 10,
|
|
KeepAliveInterval: time.Second * 30,
|
|
EnableKeepAlive: true,
|
|
MaxStreamWindowSize: uint32(1024 * 512),
|
|
LogOutput: ioutil.Discard,
|
|
}
|
|
|
|
if os.Getenv("YAMUX_DEBUG") != "" {
|
|
ymxtpt.LogOutput = os.Stderr
|
|
}
|
|
|
|
mstpt.AddTransport("/yamux/1.0.0", ymxtpt)
|
|
|
|
if mplexExp {
|
|
mstpt.AddTransport("/mplex/6.7.0", mplex.DefaultTransport)
|
|
}
|
|
|
|
// Allow muxer preference order overriding
|
|
if prefs := os.Getenv("LIBP2P_MUX_PREFS"); prefs != "" {
|
|
mstpt.OrderPreference = strings.Fields(prefs)
|
|
}
|
|
|
|
return mstpt
|
|
}
|
|
|
|
func setupDiscoveryOption(d config.Discovery) DiscoveryOption {
|
|
if d.MDNS.Enabled {
|
|
return func(ctx context.Context, h p2phost.Host) (discovery.Service, error) {
|
|
if d.MDNS.Interval == 0 {
|
|
d.MDNS.Interval = 5
|
|
}
|
|
return discovery.NewMdnsService(ctx, h, time.Duration(d.MDNS.Interval)*time.Second)
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (n *IpfsNode) HandlePeerFound(p pstore.PeerInfo) {
|
|
log.Warning("trying peer info: ", p)
|
|
ctx, cancel := context.WithTimeout(n.Context(), discoveryConnTimeout)
|
|
defer cancel()
|
|
if err := n.PeerHost.Connect(ctx, p); err != nil {
|
|
log.Warning("Failed to connect to peer found by discovery: ", err)
|
|
}
|
|
}
|
|
|
|
// startOnlineServicesWithHost is the set of services which need to be
|
|
// initialized with the host and _before_ we start listening.
|
|
func (n *IpfsNode) startOnlineServicesWithHost(ctx context.Context, host p2phost.Host, routingOption RoutingOption) error {
|
|
// setup diagnostics service
|
|
n.Diagnostics = diag.NewDiagnostics(n.Identity, host)
|
|
n.Ping = ping.NewPingService(host)
|
|
|
|
// setup routing service
|
|
r, err := routingOption(ctx, host, n.Repo.Datastore())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
n.Routing = r
|
|
|
|
// Wrap standard peer host with routing system to allow unknown peer lookups
|
|
n.PeerHost = rhost.Wrap(host, n.Routing)
|
|
|
|
// setup exchange service
|
|
const alwaysSendToPeer = true // use YesManStrategy
|
|
bitswapNetwork := bsnet.NewFromIpfsHost(n.PeerHost, n.Routing)
|
|
n.Exchange = bitswap.New(ctx, n.Identity, bitswapNetwork, n.Blockstore, alwaysSendToPeer)
|
|
|
|
size, err := n.getCacheSize()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// setup name system
|
|
n.Namesys = namesys.NewNameSystem(n.Routing, n.Repo.Datastore(), size)
|
|
|
|
// setup ipns republishing
|
|
err = n.setupIpnsRepublisher()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// getCacheSize returns cache life and cache size
|
|
func (n *IpfsNode) getCacheSize() (int, error) {
|
|
cfg, err := n.Repo.Config()
|
|
if err != nil {
|
|
return 0, err
|
|
}
|
|
|
|
cs := cfg.Ipns.ResolveCacheSize
|
|
if cs == 0 {
|
|
cs = 128
|
|
}
|
|
if cs < 0 {
|
|
return 0, fmt.Errorf("cannot specify negative resolve cache size")
|
|
}
|
|
return cs, nil
|
|
}
|
|
|
|
func (n *IpfsNode) setupIpnsRepublisher() error {
|
|
cfg, err := n.Repo.Config()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
n.IpnsRepub = ipnsrp.NewRepublisher(n.Routing, n.Repo.Datastore(), n.Peerstore)
|
|
n.IpnsRepub.AddName(n.Identity)
|
|
|
|
if cfg.Ipns.RepublishPeriod != "" {
|
|
d, err := time.ParseDuration(cfg.Ipns.RepublishPeriod)
|
|
if err != nil {
|
|
return fmt.Errorf("failure to parse config setting IPNS.RepublishPeriod: %s", err)
|
|
}
|
|
|
|
if !u.Debug && (d < time.Minute || d > (time.Hour*24)) {
|
|
return fmt.Errorf("config setting IPNS.RepublishPeriod is not between 1min and 1day: %s", d)
|
|
}
|
|
|
|
n.IpnsRepub.Interval = d
|
|
}
|
|
|
|
if cfg.Ipns.RecordLifetime != "" {
|
|
d, err := time.ParseDuration(cfg.Ipns.RepublishPeriod)
|
|
if err != nil {
|
|
return fmt.Errorf("failure to parse config setting IPNS.RecordLifetime: %s", err)
|
|
}
|
|
|
|
n.IpnsRepub.RecordLifetime = d
|
|
}
|
|
|
|
n.Process().Go(n.IpnsRepub.Run)
|
|
|
|
return nil
|
|
}
|
|
|
|
// Process returns the Process object
|
|
func (n *IpfsNode) Process() goprocess.Process {
|
|
return n.proc
|
|
}
|
|
|
|
// Close calls Close() on the Process object
|
|
func (n *IpfsNode) Close() error {
|
|
return n.proc.Close()
|
|
}
|
|
|
|
// Context returns the IpfsNode context
|
|
func (n *IpfsNode) Context() context.Context {
|
|
if n.ctx == nil {
|
|
n.ctx = context.TODO()
|
|
}
|
|
return n.ctx
|
|
}
|
|
|
|
// teardown closes owned children. If any errors occur, this function returns
|
|
// the first error.
|
|
func (n *IpfsNode) teardown() error {
|
|
log.Debug("core is shutting down...")
|
|
// owned objects are closed in this teardown to ensure that they're closed
|
|
// regardless of which constructor was used to add them to the node.
|
|
var closers []io.Closer
|
|
|
|
// NOTE: The order that objects are added(closed) matters, if an object
|
|
// needs to use another during its shutdown/cleanup process, it should be
|
|
// closed before that other object
|
|
|
|
if n.FilesRoot != nil {
|
|
closers = append(closers, n.FilesRoot)
|
|
}
|
|
|
|
if n.Exchange != nil {
|
|
closers = append(closers, n.Exchange)
|
|
}
|
|
|
|
if n.Mounts.Ipfs != nil && !n.Mounts.Ipfs.IsActive() {
|
|
closers = append(closers, mount.Closer(n.Mounts.Ipfs))
|
|
}
|
|
if n.Mounts.Ipns != nil && !n.Mounts.Ipns.IsActive() {
|
|
closers = append(closers, mount.Closer(n.Mounts.Ipns))
|
|
}
|
|
|
|
if dht, ok := n.Routing.(*dht.IpfsDHT); ok {
|
|
closers = append(closers, dht.Process())
|
|
}
|
|
|
|
if n.Blocks != nil {
|
|
closers = append(closers, n.Blocks)
|
|
}
|
|
|
|
if n.Bootstrapper != nil {
|
|
closers = append(closers, n.Bootstrapper)
|
|
}
|
|
|
|
if n.PeerHost != nil {
|
|
closers = append(closers, n.PeerHost)
|
|
}
|
|
|
|
// Repo closed last, most things need to preserve state here
|
|
closers = append(closers, n.Repo)
|
|
|
|
var errs []error
|
|
for _, closer := range closers {
|
|
if err := closer.Close(); err != nil {
|
|
errs = append(errs, err)
|
|
}
|
|
}
|
|
if len(errs) > 0 {
|
|
return errs[0]
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (n *IpfsNode) OnlineMode() bool {
|
|
switch n.mode {
|
|
case onlineMode:
|
|
return true
|
|
default:
|
|
return false
|
|
}
|
|
}
|
|
|
|
func (n *IpfsNode) SetLocal(isLocal bool) {
|
|
if isLocal {
|
|
n.mode = localMode
|
|
}
|
|
n.localModeSet = true
|
|
}
|
|
|
|
func (n *IpfsNode) LocalMode() bool {
|
|
if !n.localModeSet {
|
|
// programmer error should not happen
|
|
panic("local mode not set")
|
|
}
|
|
switch n.mode {
|
|
case localMode:
|
|
return true
|
|
default:
|
|
return false
|
|
}
|
|
}
|
|
|
|
func (n *IpfsNode) Bootstrap(cfg BootstrapConfig) error {
|
|
|
|
// TODO what should return value be when in offlineMode?
|
|
if n.Routing == nil {
|
|
return nil
|
|
}
|
|
|
|
if n.Bootstrapper != nil {
|
|
n.Bootstrapper.Close() // stop previous bootstrap process.
|
|
}
|
|
|
|
// if the caller did not specify a bootstrap peer function, get the
|
|
// freshest bootstrap peers from config. this responds to live changes.
|
|
if cfg.BootstrapPeers == nil {
|
|
cfg.BootstrapPeers = func() []pstore.PeerInfo {
|
|
ps, err := n.loadBootstrapPeers()
|
|
if err != nil {
|
|
log.Warning("failed to parse bootstrap peers from config")
|
|
return nil
|
|
}
|
|
return ps
|
|
}
|
|
}
|
|
|
|
var err error
|
|
n.Bootstrapper, err = Bootstrap(n, cfg)
|
|
return err
|
|
}
|
|
|
|
func (n *IpfsNode) loadID() error {
|
|
if n.Identity != "" {
|
|
return errors.New("identity already loaded")
|
|
}
|
|
|
|
cfg, err := n.Repo.Config()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
cid := cfg.Identity.PeerID
|
|
if cid == "" {
|
|
return errors.New("identity was not set in config (was 'ipfs init' run?)")
|
|
}
|
|
if len(cid) == 0 {
|
|
return errors.New("no peer ID in config! (was 'ipfs init' run?)")
|
|
}
|
|
|
|
n.Identity = peer.ID(b58.Decode(cid))
|
|
return nil
|
|
}
|
|
|
|
func (n *IpfsNode) GetKey(name string) (ic.PrivKey, error) {
|
|
if name == "self" {
|
|
return n.PrivateKey, nil
|
|
} else {
|
|
return n.Repo.Keystore().Get(name)
|
|
}
|
|
}
|
|
|
|
func (n *IpfsNode) LoadPrivateKey() error {
|
|
if n.Identity == "" || n.Peerstore == nil {
|
|
return errors.New("loaded private key out of order.")
|
|
}
|
|
|
|
if n.PrivateKey != nil {
|
|
return errors.New("private key already loaded")
|
|
}
|
|
|
|
cfg, err := n.Repo.Config()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
sk, err := loadPrivateKey(&cfg.Identity, n.Identity)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
n.PrivateKey = sk
|
|
n.Peerstore.AddPrivKey(n.Identity, n.PrivateKey)
|
|
n.Peerstore.AddPubKey(n.Identity, sk.GetPublic())
|
|
return nil
|
|
}
|
|
|
|
func (n *IpfsNode) loadBootstrapPeers() ([]pstore.PeerInfo, error) {
|
|
cfg, err := n.Repo.Config()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
parsed, err := cfg.BootstrapPeers()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return toPeerInfos(parsed), nil
|
|
}
|
|
|
|
func (n *IpfsNode) loadFilesRoot() error {
|
|
dsk := ds.NewKey("/local/filesroot")
|
|
pf := func(ctx context.Context, c *cid.Cid) error {
|
|
return n.Repo.Datastore().Put(dsk, c.Bytes())
|
|
}
|
|
|
|
var nd *merkledag.ProtoNode
|
|
val, err := n.Repo.Datastore().Get(dsk)
|
|
|
|
switch {
|
|
case err == ds.ErrNotFound || val == nil:
|
|
nd = ft.EmptyDirNode()
|
|
_, err := n.DAG.Add(nd)
|
|
if err != nil {
|
|
return fmt.Errorf("failure writing to dagstore: %s", err)
|
|
}
|
|
case err == nil:
|
|
c, err := cid.Cast(val.([]byte))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
rnd, err := n.DAG.Get(n.Context(), c)
|
|
if err != nil {
|
|
return fmt.Errorf("error loading filesroot from DAG: %s", err)
|
|
}
|
|
|
|
pbnd, ok := rnd.(*merkledag.ProtoNode)
|
|
if !ok {
|
|
return merkledag.ErrNotProtobuf
|
|
}
|
|
|
|
nd = pbnd
|
|
default:
|
|
return err
|
|
}
|
|
|
|
mr, err := mfs.NewRoot(n.Context(), n.DAG, nd, pf)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
n.FilesRoot = mr
|
|
return nil
|
|
}
|
|
|
|
// SetupOfflineRouting loads the local nodes private key and
|
|
// uses it to instantiate a routing system in offline mode.
|
|
// This is primarily used for offline ipns modifications.
|
|
func (n *IpfsNode) SetupOfflineRouting() error {
|
|
if n.Routing != nil {
|
|
// Routing was already set up
|
|
return nil
|
|
}
|
|
err := n.LoadPrivateKey()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
n.Routing = offroute.NewOfflineRouter(n.Repo.Datastore(), n.PrivateKey)
|
|
|
|
size, err := n.getCacheSize()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
n.Namesys = namesys.NewNameSystem(n.Routing, n.Repo.Datastore(), size)
|
|
|
|
return nil
|
|
}
|
|
|
|
func loadPrivateKey(cfg *config.Identity, id peer.ID) (ic.PrivKey, error) {
|
|
sk, err := cfg.DecodePrivateKey("passphrase todo!")
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
id2, err := peer.IDFromPrivateKey(sk)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
if id2 != id {
|
|
return nil, fmt.Errorf("private key in config does not match id: %s != %s", id, id2)
|
|
}
|
|
|
|
return sk, nil
|
|
}
|
|
|
|
func listenAddresses(cfg *config.Config) ([]ma.Multiaddr, error) {
|
|
var listen []ma.Multiaddr
|
|
for _, addr := range cfg.Addresses.Swarm {
|
|
maddr, err := ma.NewMultiaddr(addr)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Failure to parse config.Addresses.Swarm: %s", cfg.Addresses.Swarm)
|
|
}
|
|
listen = append(listen, maddr)
|
|
}
|
|
|
|
return listen, nil
|
|
}
|
|
|
|
type ConstructPeerHostOpts struct {
|
|
DisableNatPortMap bool
|
|
}
|
|
|
|
type HostOption func(ctx context.Context, id peer.ID, ps pstore.Peerstore, bwr metrics.Reporter, fs []*net.IPNet, tpt smux.Transport, protc ipnet.Protector, opts *ConstructPeerHostOpts) (p2phost.Host, error)
|
|
|
|
var DefaultHostOption HostOption = constructPeerHost
|
|
|
|
// isolates the complex initialization steps
|
|
func constructPeerHost(ctx context.Context, id peer.ID, ps pstore.Peerstore, bwr metrics.Reporter, fs []*net.IPNet, tpt smux.Transport, protec ipnet.Protector, opts *ConstructPeerHostOpts) (p2phost.Host, error) {
|
|
|
|
// no addresses to begin with. we'll start later.
|
|
swrm, err := swarm.NewSwarmWithProtector(ctx, nil, id, ps, protec, tpt, bwr)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
network := (*swarm.Network)(swrm)
|
|
|
|
for _, f := range fs {
|
|
network.Swarm().Filters.AddDialFilter(f)
|
|
}
|
|
|
|
hostOpts := []interface{}{bwr}
|
|
if !opts.DisableNatPortMap {
|
|
hostOpts = append(hostOpts, p2pbhost.NATPortMap)
|
|
}
|
|
|
|
host := p2pbhost.New(network, hostOpts...)
|
|
|
|
return host, nil
|
|
}
|
|
|
|
// startListening on the network addresses
|
|
func startListening(ctx context.Context, host p2phost.Host, cfg *config.Config) error {
|
|
listenAddrs, err := listenAddresses(cfg)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// make sure we error out if our config does not have addresses we can use
|
|
log.Debugf("Config.Addresses.Swarm:%s", listenAddrs)
|
|
filteredAddrs := addrutil.FilterUsableAddrs(listenAddrs)
|
|
log.Debugf("Config.Addresses.Swarm:%s (filtered)", filteredAddrs)
|
|
if len(filteredAddrs) < 1 {
|
|
return fmt.Errorf("addresses in config not usable: %s", listenAddrs)
|
|
}
|
|
|
|
// Actually start listening:
|
|
if err := host.Network().Listen(filteredAddrs...); err != nil {
|
|
return err
|
|
}
|
|
|
|
// list out our addresses
|
|
addrs, err := host.Network().InterfaceListenAddresses()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
log.Infof("Swarm listening at: %s", addrs)
|
|
return nil
|
|
}
|
|
|
|
func constructDHTRouting(ctx context.Context, host p2phost.Host, dstore repo.Datastore) (routing.IpfsRouting, error) {
|
|
dhtRouting := dht.NewDHT(ctx, host, dstore)
|
|
dhtRouting.Validator[IpnsValidatorTag] = namesys.IpnsRecordValidator
|
|
dhtRouting.Selector[IpnsValidatorTag] = namesys.IpnsSelectorFunc
|
|
return dhtRouting, nil
|
|
}
|
|
|
|
func constructClientDHTRouting(ctx context.Context, host p2phost.Host, dstore repo.Datastore) (routing.IpfsRouting, error) {
|
|
dhtRouting := dht.NewDHTClient(ctx, host, dstore)
|
|
dhtRouting.Validator[IpnsValidatorTag] = namesys.IpnsRecordValidator
|
|
dhtRouting.Selector[IpnsValidatorTag] = namesys.IpnsSelectorFunc
|
|
return dhtRouting, nil
|
|
}
|
|
|
|
type RoutingOption func(context.Context, p2phost.Host, repo.Datastore) (routing.IpfsRouting, error)
|
|
|
|
type DiscoveryOption func(context.Context, p2phost.Host) (discovery.Service, error)
|
|
|
|
var DHTOption RoutingOption = constructDHTRouting
|
|
var DHTClientOption RoutingOption = constructClientDHTRouting
|
|
var NilRouterOption RoutingOption = nilrouting.ConstructNilRouting
|