wallets 2 ipfs

This commit is contained in:
qo-op 2020-03-22 00:03:47 +01:00
parent 99a59a1325
commit 88e006bcdb
7 changed files with 186 additions and 18 deletions

View File

@ -1,5 +1,5 @@
#!/bin/bash
# https://pad.p2p.legal/scuttlebot?both#Social-Layer-ScuttleBut-server
scuttlebutt() {
echo "TODO"
}

@ -1 +1 @@
Subproject commit 06e1a72d039d478a3fcf1341c1f7db1cae75b0e9
Subproject commit ea94ab06ea044c025bf583153c3f6e02beaac49b

View File

@ -44,9 +44,9 @@ return 0
########################################################################
# PUBLISH ~/.zen/wallets ON /ipns/$NODEIPNS
function wallets_ipfs_publish (){
IWALLETS=$(ipfs add -rHq '~/.zen/wallets' | tail -n 1)
# PUBLISH ~/.zen/ipfs ON /ipns/$NODEIPNS
function ipfs_ipfs_publish (){
IWALLETS=$(ipfs add -rHq '~/.zen/ipfs' | tail -n 1)
NODEIPNS=$(ipfs name publish --quieter /ipfs/$IWALLETS)
echo $IWALLETS
}

View File

@ -37,8 +37,8 @@ DUNITERURL="https://$DUNITERNODE"
IPFSNODEID=$(ipfs id -f='<id>\n')
[[ $IPFSNODEID == "" ]] && echo "$USER Please Install IPFS !!" && exit 1
[[ ! -d ~/.zen/scan ]] && mkdir -p ~/.zen/scan # Directory containing G1 blockchain incoming TX Scan
[[ ! -d ~/.zen/wallets ]] && mkdir -p ~/.zen/wallets # Directory where NODE store SMS & other Channel Wallets
[[ ! -d ~/.zen/wallets_swarm ]] && mkdir -p ~/.zen/wallets_swarm # Local copy of all SSB friends IPFS Nodes published wallets
[[ ! -d ~/.zen/ipfs ]] && mkdir -p ~/.zen/ipfs # Directory where NODE store SMS & other Channel Wallets
[[ ! -d ~/.zen/ipfs_swarm ]] && mkdir -p ~/.zen/ipfs_swarm # Local copy of all SSB friends IPFS Nodes published ipfs
#########################################################################################################
# GET G1 PUBKEY FROM SCUTTLEBUTT or $2 (DEBUG)

View File

@ -37,17 +37,17 @@ IPFSNODEID=$(ipfs id -f='<id>\n')
[[ ! -f ~/.ssb/secret.dunikey ]] && $MY_PATH/tools/secret2dunikey.sh
NODE_G1PUBKEY=$(cat ~/.ssb/secret.dunikey | grep 'pub:' | cut -d ' ' -f 2)
# CREATE ~/.zen/wallets/.$IPFSNODEID/G1SSB
# CREATE ~/.zen/ipfs/.$IPFSNODEID/G1SSB
##############################################
[[ $IPFSNODEID == "" ]] && echo "ERROR missing IPFSNODEID NODE_G1PUBKEY" && exit 1
mkdir -p ~/.zen/wallets/.$IPFSNODEID/G1SSB
mkdir -p ~/.zen/ipfs/.$IPFSNODEID/G1SSB
## PUBLISH ABOUT MESSAGE
##############################################
ssbpub=$(sbotc whoami | jq -r .id)
[[ $ssbpub == "" ]] && echo "ERROR missing ssb-server ?" && exit 1
# G1 wallet QRCode
qrcodefile=~/.zen/wallets/.$IPFSNODEID/G1SSB/_g1.qrcode.png
qrcodefile=~/.zen/ipfs/.$IPFSNODEID/G1SSB/_g1.qrcode.png
qrencode -s 5 -o $qrcodefile "$NODE_G1PUBKEY"
# Publish About message
name=${qrcodefile##*/}
@ -55,10 +55,12 @@ id="$(sbotc blobs.add < $qrcodefile)"
type="$(file -b --mime-type $qrcodefile)"
size="$(wc -c < $qrcodefile)"
# Publish About message
sbot publish --type about --about $ssbpub --description "Astroport G1SSB Node\nipfs ls /ipns/$IPFSNODEID" --name "$USER@$(cat /etc/hostname)" --image "$id"
sbotc publish '{"type":"post","text":"['"$name"']('"$id"')","mentions":[{"link":"'"$id"'","name":"'"$name"'","size":'"$size"',"type":"'"$type"'"}]}'
sbot publish --type about --about $ssbpub --description "Welcome to [Astroport](https://astroport.com) G1SSB/IPFS Station [$IPFSNODEID](http://$(cat /etc/hostname).local/ipns/$IPFSNODEID)" --name "$USER@$(cat /etc/hostname)" --image "$id"
#sbotc publish '{"type":"about","about":"'"$ssbpub"'","description":"Welcome to [Astroport](https://astroport.com) G1SSB/IPFS Station\nhttp://'$(cat /etc/hostname)'.local/ipns/$IPFSNODEID","name":'"'$USER'@'$(cat /etc/hostname)'"',"image":'"'$id'"'}'
sbotc publish '{"type":"post","text":"[G1SSB_Wallet.png]('"$id"')\nUse https://cesium.app to send payment.\nComment your transaction with '"'Zen'"' to order ZenTag...","mentions":[{"link":"'"$id"'","name":"'"$name"'","size":'"$size"',"type":"'"$type"'"}]}'
# COPY NODE G1SSB ID to IPFS
echo "$ssbpub" > ~/.zen/wallets/.$IPFSNODEID/G1SSB/_ssb.whoami
echo "$NODE_G1PUBKEY" > ~/.zen/wallets/.$IPFSNODEID/G1SSB/_g1.pubkey
echo "$ssbpub" > ~/.zen/ipfs/.$IPFSNODEID/G1SSB/_ssb.whoami
echo "$NODE_G1PUBKEY" > ~/.zen/ipfs/.$IPFSNODEID/G1SSB/_g1.pubkey

166
zen/tools/img2html.py Normal file
View File

@ -0,0 +1,166 @@
#!/usr/bin/python
# Image to HTML converter
# Copyright (C) January 2019 Neil Fraser
# https://neil.fraser.name/
# This program is free software; you can redistribute it and/or
# modify it under the terms of version 2 of the GNU General
# Public License as published by the Free Software Foundation.
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
# http://www.gnu.org/
# Loads JPEGs, PNGs and GIFs from websites and converts them to HTML.
# Usage: img2html.py?img=www.example.com/image.jpg
from PIL import Image
import cgi
import cStringIO
import math
import re
import sys
import urllib
# Throw a 500 error and terminate the program.
def die(msg):
print('Status:500')
print('Content-type: text/plain')
print('')
print('Error: ' + msg)
sys.exit()
def is_valid_url(url):
regex = re.compile(
r'^https?://' # http:// or https://
r'(?:(?:[A-Z0-9](?:[A-Z0-9-]{0,61}[A-Z0-9])?\.)+[A-Z]{2,6}\.?|' # domain...
r'\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})' # ...or IP
r'(?::\d+)?' # optional port
r'(?:/?|[/?]\S+)$', re.IGNORECASE)
return url is not None and regex.search(url)
form = cgi.FieldStorage()
if not form.has_key('img'):
die('"img" paramater not found.')
#rows = min(512+1, int(form['y'].value, 10))
remoteurl = form['img'].value
remoteurl = remoteurl.strip()
if not remoteurl:
die('No image URL specified.')
if not re.match('\\w+:\/\/', remoteurl):
remoteurl = 'http://' + remoteurl
if not is_valid_url(remoteurl):
die('Invalid image URL. Please go back and check the address.')
# Reduce load on my server, use cached tux.html if the request is tux.jpg
if remoteurl == 'https://neil.fraser.name/software/img2html/tux.jpg':
f = open('/home/neil/html/software/img2html/tux.html')
print("Content-type: text/html\n\n")
print(f.read())
f.close()
sys.exit()
try:
f = urllib.urlopen(remoteurl)
data = f.read()
except Exception as err:
die('Invalid image URL: %s' % err)
oldsize = int(round(len(data) / 1024))
cStr = cStringIO.StringIO(data)
image = Image.open(cStr)
image = image.convert('RGBA')
background = Image.new('RGBA', image.size, (255, 255, 255))
background.paste(image, mask=image.split()[3]) # 3 is the alpha channel
image = background
image = image.convert('RGB')
maxPixels = 100*100
(oldX, oldY) = image.size
if oldX * oldY > maxPixels:
factor = math.sqrt(maxPixels / float(oldX * oldY))
newX = int(round(oldX * factor))
newY = int(round(oldY * factor))
image.thumbnail((newX, newY), Image.ANTIALIAS)
msg = '[This image is too large to comfortably handle, so it has been scaled down to %s%% of its original size.]<P>' % int(100.0 * newX / oldX);
else:
newX = oldX
newY = oldY
msg = ''
# Scan the image pixel by pixel and build the HTML table.
table = '';
firstrow = True # Disable RLE for first row of each table segment (dodge Mozilla bug)
for y in range(newY):
row = '';
for x in range(newX):
try:
(r, g, b) = image.getpixel((x, y))
except:
# Some images throw a range error on some (transparent?) pixels.
(r, g, b) = (255, 255, 255)
if x == newX:
# Dummy run to clear the colspan buffer.
rgb = ''
else:
rgb = '%02x%02x%02x' % (r, g, b)
if x == 0: # Initialise the RLE (Run Length Encoding)
prev_rgb = rgb
span = 0
span += 1
if rgb != prev_rgb or firstrow:
if span == 1: # One pixel.
row += "<TD BGCOLOR=#%s><img width=1 height=1></TD>" % prev_rgb
else: # A run of multiple pixels with the same colour.
row += "<TD BGCOLOR=#%s COLSPAN=%d><img width=1 height=1></TD>" % (prev_rgb, span)
span = 0
prev_rgb = rgb
table += "<TR>%s</TR>\n" % row
# Segment the table so that MSIE renders it in pieces instead of waiting till the end.
if y != 0 and (y == 5 or y % 15 == 0) and y < newY - 10:
table += "</TABLE><TABLE CELLPADDING=0 CELLSPACING=0 BORDER=0>\n"
firstrow = True
else:
firstrow = False
newsize = int(round(len(table) / 1024))
# We're done. Now print it all out (this is what takes the time).
print("Content-type: text/html\n")
print("""
<HTML>
<HEAD>
<TITLE>img2html: {remoteurl}</TITLE>
</HEAD>
<BODY>
<DL>
<DT><B>Original Image</B>
<DD><A HREF="{remoteurl}">{remoteurl}</A>
<DD>{oldX}x{oldY}
<DD>{oldsize}KB
<P>
{msg}
<DT><B>Text Image</B>
<DD>{newX}x{newY}
<DD>{newsize}KB
<DD>
<TABLE CELLPADDING=0 CELLSPACING=0 BORDER=0>
{table}</TABLE>
<P>
<DT><B>Done</B>
</DL>
</BODY></HTML>
""".format(remoteurl=remoteurl, table=table, msg=msg,
oldsize=oldsize, newsize=newsize,
oldX=oldX, oldY=oldY, newX=newX, newY=newY))

View File

@ -77,7 +77,7 @@ NODE_G1PUBKEY=$(cat ~/.ssb/secret.dunikey | grep 'pub:' | cut -d ' ' -f 2)
AA=$(echo $($MY_PATH/tools/diceware.sh 6 | xargs) | sed s/\ /_/g ) # ZenTag Name = Diceware_6_words
AAH=$(echo -n ${AA} | sha256sum | cut -d ' ' -f 1) # ZenTag Name SHA256
# Create Unique Zentag for all IPFS SWARM!
while [[ $(grep -Rwl "$AA" ~/.zen/wallets_swarm/.Qm*/TAG/) ]]; do
while [[ $(grep -Rwl "$AA" ~/.zen/ipfs_swarm/.Qm*/TAG/) ]]; do
AA=$(echo $($MY_PATH/tools/diceware.sh 6 | xargs) | sed s/\ /_/g )
AAH=$(echo -n ${AA} | sha256sum | cut -d ' ' -f 1)
done
@ -175,8 +175,8 @@ J=$(ipfs name publish -k ${AA}.key --quieter /ipfs/${I})
echo "${J}" > ~/.zen/tag/${AAH}/_ipns
# REPORT ZenTag to SWARM
mkdir -p ~/.zen/wallets/.$IPFSNODEID/TAG/
echo "${AA}" > ~/.zen/wallets/.$IPFSNODEID/TAG/${J}
mkdir -p ~/.zen/ipfs/.$IPFSNODEID/TAG/
echo "${AA}" > ~/.zen/ipfs/.$IPFSNODEID/TAG/${J}
### G1TAG PRINT TYPE:DATA:IPNS
########################################################################
@ -194,7 +194,7 @@ echo "##################################################################
ipfs pin ls -q --type recursive | xargs ipfs pin rm && ipfs repo gc
rm -f ~/.ipfs/keystore/*.key
rm -Rf ~/.zen/tag/*
rm -Rf ~/.zen/wallets/.$IPFSNODEID/TAG
rm -Rf ~/.zen/ipfs/.$IPFSNODEID/TAG
##################################################################"
########################################################################
exit 0