package main import ( "encoding/base64" "errors" "os" "github.com/jbenet/go-ipfs/Godeps/_workspace/src/github.com/gonuts/flag" "github.com/jbenet/go-ipfs/Godeps/_workspace/src/github.com/jbenet/commander" config "github.com/jbenet/go-ipfs/config" ci "github.com/jbenet/go-ipfs/crypto" spipe "github.com/jbenet/go-ipfs/crypto/spipe" u "github.com/jbenet/go-ipfs/util" ) var cmdIpfsInit = &commander.Command{ UsageLine: "init", Short: "Initialize ipfs local configuration", Long: `ipfs init Initializes ipfs configuration files and generates a new keypair. `, Run: initCmd, Flag: *flag.NewFlagSet("ipfs-init", flag.ExitOnError), } func init() { cmdIpfsInit.Flag.Int("b", 4096, "number of bits for keypair") cmdIpfsInit.Flag.String("p", "", "passphrase for encrypting keys") cmdIpfsInit.Flag.Bool("f", false, "force overwrite of existing config") } func initCmd(c *commander.Command, inp []string) error { configpath, err := getConfigDir(c.Parent) if err != nil { return err } if configpath == "" { configpath, err = u.TildeExpansion("~/.go-ipfs") if err != nil { return err } } filename, err := config.Filename(configpath + "/config") if err != nil { return errors.New("Couldn't get home directory path") } fi, err := os.Lstat(filename) force, ok := c.Flag.Lookup("f").Value.Get().(bool) if !ok { return errors.New("failed to parse force flag") } if fi != nil || (err != nil && !os.IsNotExist(err)) && !force { return errors.New("ipfs configuration file already exists!\nReinitializing would overwrite your keys.\n(use -f to force overwrite)") } cfg := new(config.Config) cfg.Datastore = config.Datastore{} dspath, err := u.TildeExpansion("~/.go-ipfs/datastore") if err != nil { return err } cfg.Datastore.Path = dspath cfg.Datastore.Type = "leveldb" cfg.Identity = new(config.Identity) // This needs thought // cfg.Identity.Address = "" nbits, ok := c.Flag.Lookup("b").Value.Get().(int) if !ok { return errors.New("failed to get bits flag") } if nbits < 1024 { return errors.New("Bitsize less than 1024 is considered unsafe.") } sk, pk, err := ci.GenerateKeyPair(ci.RSA, nbits) if err != nil { return err } // currently storing key unencrypted. in the future we need to encrypt it. // TODO(security) skbytes, err := sk.Bytes() if err != nil { return err } cfg.Identity.PrivKey = base64.StdEncoding.EncodeToString(skbytes) id, err := spipe.IDFromPubKey(pk) if err != nil { return err } cfg.Identity.PeerID = id.Pretty() path, err := u.TildeExpansion(config.DefaultConfigFilePath) if err != nil { return err } err = config.WriteConfigFile(path, cfg) if err != nil { return err } return nil }