mirror of
https://github.com/ipfs/kubo.git
synced 2025-07-15 07:58:15 +08:00

Now that we add nodes to the DAG when pinning, don't bother adding them twice. License: MIT Signed-off-by: Steven Allen <steven@stebalien.com>
265 lines
6.5 KiB
Go
265 lines
6.5 KiB
Go
package main
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"io"
|
|
"os"
|
|
"path"
|
|
"strings"
|
|
|
|
assets "github.com/ipfs/go-ipfs/assets"
|
|
cmds "github.com/ipfs/go-ipfs/commands"
|
|
core "github.com/ipfs/go-ipfs/core"
|
|
namesys "github.com/ipfs/go-ipfs/namesys"
|
|
config "github.com/ipfs/go-ipfs/repo/config"
|
|
fsrepo "github.com/ipfs/go-ipfs/repo/fsrepo"
|
|
|
|
"gx/ipfs/QmUyfy4QSr3NXym4etEiRyxBLqqAeKHJuRdi8AACxg63fZ/go-ipfs-cmdkit"
|
|
)
|
|
|
|
const (
|
|
nBitsForKeypairDefault = 2048
|
|
)
|
|
|
|
var initCmd = &cmds.Command{
|
|
Helptext: cmdkit.HelpText{
|
|
Tagline: "Initializes ipfs config file.",
|
|
ShortDescription: `
|
|
Initializes ipfs configuration files and generates a new keypair.
|
|
|
|
If you are going to run IPFS in server environment, you may want to
|
|
initialize it using 'server' profile.
|
|
|
|
Available profiles:
|
|
'server' - Disables local host discovery, recommended when
|
|
running IPFS on machines with public IPv4 addresses.
|
|
'test' - Reduces external interference of IPFS daemon, this
|
|
is useful when using the daemon in test environments.
|
|
|
|
ipfs uses a repository in the local file system. By default, the repo is
|
|
located at ~/.ipfs. To change the repo location, set the $IPFS_PATH
|
|
environment variable:
|
|
|
|
export IPFS_PATH=/path/to/ipfsrepo
|
|
`,
|
|
},
|
|
Arguments: []cmdkit.Argument{
|
|
cmdkit.FileArg("default-config", false, false, "Initialize with the given configuration.").EnableStdin(),
|
|
},
|
|
Options: []cmdkit.Option{
|
|
cmdkit.IntOption("bits", "b", "Number of bits to use in the generated RSA private key.").WithDefault(nBitsForKeypairDefault),
|
|
cmdkit.BoolOption("empty-repo", "e", "Don't add and pin help files to the local storage."),
|
|
cmdkit.StringOption("profile", "p", "Apply profile settings to config. Multiple profiles can be separated by ','"),
|
|
|
|
// TODO need to decide whether to expose the override as a file or a
|
|
// directory. That is: should we allow the user to also specify the
|
|
// name of the file?
|
|
// TODO cmdkit.StringOption("event-logs", "l", "Location for machine-readable event logs."),
|
|
},
|
|
PreRun: func(req cmds.Request) error {
|
|
daemonLocked, err := fsrepo.LockedByOtherProcess(req.InvocContext().ConfigRoot)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
log.Info("checking if daemon is running...")
|
|
if daemonLocked {
|
|
log.Debug("ipfs daemon is running")
|
|
e := "ipfs daemon is running. please stop it to run this command"
|
|
return cmds.ClientError(e)
|
|
}
|
|
|
|
return nil
|
|
},
|
|
Run: func(req cmds.Request, res cmds.Response) {
|
|
// needs to be called at least once
|
|
res.SetOutput(nil)
|
|
|
|
if req.InvocContext().Online {
|
|
res.SetError(errors.New("init must be run offline only!"), cmdkit.ErrNormal)
|
|
return
|
|
}
|
|
|
|
empty, _, err := req.Option("e").Bool()
|
|
if err != nil {
|
|
res.SetError(err, cmdkit.ErrNormal)
|
|
return
|
|
}
|
|
|
|
nBitsForKeypair, _, err := req.Option("b").Int()
|
|
if err != nil {
|
|
res.SetError(err, cmdkit.ErrNormal)
|
|
return
|
|
}
|
|
|
|
var conf *config.Config
|
|
|
|
f := req.Files()
|
|
if f != nil {
|
|
confFile, err := f.NextFile()
|
|
if err != nil {
|
|
res.SetError(err, cmdkit.ErrNormal)
|
|
return
|
|
}
|
|
|
|
conf = &config.Config{}
|
|
if err := json.NewDecoder(confFile).Decode(conf); err != nil {
|
|
res.SetError(err, cmdkit.ErrNormal)
|
|
return
|
|
}
|
|
}
|
|
|
|
profile, _, err := req.Option("profile").String()
|
|
if err != nil {
|
|
res.SetError(err, cmdkit.ErrNormal)
|
|
return
|
|
}
|
|
|
|
var profiles []string
|
|
if profile != "" {
|
|
profiles = strings.Split(profile, ",")
|
|
}
|
|
|
|
if err := doInit(os.Stdout, req.InvocContext().ConfigRoot, empty, nBitsForKeypair, profiles, conf); err != nil {
|
|
res.SetError(err, cmdkit.ErrNormal)
|
|
return
|
|
}
|
|
},
|
|
}
|
|
|
|
var errRepoExists = errors.New(`ipfs configuration file already exists!
|
|
Reinitializing would overwrite your keys.
|
|
`)
|
|
|
|
func initWithDefaults(out io.Writer, repoRoot string) error {
|
|
return doInit(out, repoRoot, false, nBitsForKeypairDefault, nil, nil)
|
|
}
|
|
|
|
func doInit(out io.Writer, repoRoot string, empty bool, nBitsForKeypair int, confProfiles []string, conf *config.Config) error {
|
|
if _, err := fmt.Fprintf(out, "initializing IPFS node at %s\n", repoRoot); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := checkWriteable(repoRoot); err != nil {
|
|
return err
|
|
}
|
|
|
|
if fsrepo.IsInitialized(repoRoot) {
|
|
return errRepoExists
|
|
}
|
|
|
|
if conf == nil {
|
|
var err error
|
|
conf, err = config.Init(out, nBitsForKeypair)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
for _, profile := range confProfiles {
|
|
transformer, ok := config.ConfigProfiles[profile]
|
|
if !ok {
|
|
return fmt.Errorf("invalid configuration profile: %s", profile)
|
|
}
|
|
|
|
if err := transformer(conf); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
if err := fsrepo.Init(repoRoot, conf); err != nil {
|
|
return err
|
|
}
|
|
|
|
if !empty {
|
|
if err := addDefaultAssets(out, repoRoot); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return initializeIpnsKeyspace(repoRoot)
|
|
}
|
|
|
|
func checkWriteable(dir string) error {
|
|
_, err := os.Stat(dir)
|
|
if err == nil {
|
|
// dir exists, make sure we can write to it
|
|
testfile := path.Join(dir, "test")
|
|
fi, err := os.Create(testfile)
|
|
if err != nil {
|
|
if os.IsPermission(err) {
|
|
return fmt.Errorf("%s is not writeable by the current user", dir)
|
|
}
|
|
return fmt.Errorf("unexpected error while checking writeablility of repo root: %s", err)
|
|
}
|
|
fi.Close()
|
|
return os.Remove(testfile)
|
|
}
|
|
|
|
if os.IsNotExist(err) {
|
|
// dir doesnt exist, check that we can create it
|
|
return os.Mkdir(dir, 0775)
|
|
}
|
|
|
|
if os.IsPermission(err) {
|
|
return fmt.Errorf("cannot write to %s, incorrect permissions", err)
|
|
}
|
|
|
|
return err
|
|
}
|
|
|
|
func addDefaultAssets(out io.Writer, repoRoot string) error {
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
defer cancel()
|
|
|
|
r, err := fsrepo.Open(repoRoot)
|
|
if err != nil { // NB: repo is owned by the node
|
|
return err
|
|
}
|
|
|
|
nd, err := core.NewNode(ctx, &core.BuildCfg{Repo: r})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer nd.Close()
|
|
|
|
dkey, err := assets.SeedInitDocs(nd)
|
|
if err != nil {
|
|
return fmt.Errorf("init: seeding init docs failed: %s", err)
|
|
}
|
|
log.Debugf("init: seeded init docs %s", dkey)
|
|
|
|
if _, err = fmt.Fprintf(out, "to get started, enter:\n"); err != nil {
|
|
return err
|
|
}
|
|
|
|
_, err = fmt.Fprintf(out, "\n\tipfs cat /ipfs/%s/readme\n\n", dkey)
|
|
return err
|
|
}
|
|
|
|
func initializeIpnsKeyspace(repoRoot string) error {
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
defer cancel()
|
|
|
|
r, err := fsrepo.Open(repoRoot)
|
|
if err != nil { // NB: repo is owned by the node
|
|
return err
|
|
}
|
|
|
|
nd, err := core.NewNode(ctx, &core.BuildCfg{Repo: r})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer nd.Close()
|
|
|
|
err = nd.SetupOfflineRouting()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return namesys.InitializeKeyspace(ctx, nd.Namesys, nd.Pinning, nd.PrivateKey)
|
|
}
|