astroport/zen/README.md

72 lines
2.1 KiB
Markdown

# Explication de la machinerie.
Each IPFS Node publish on it's onw IPFS address ~/.zen/ipfs directory.
It contains per channel/wallets credentials and properties (each unique).
.Qm*** sub directory is used for exchanging messages between peers
SSB is the source of the gossip ipfs swarm structure
Blob can accept commands from the differents channels it manages.
Channels are populated/monitored through to ~/.zen/ipfs_swarm
IMPORTANT TODO!!
- timeout.sh CPU problem to investigate
# MOVE swarm.key (once cron_MINUTE.sh is activated should be OK)
mv ~/.ipfs/swarm.key ~/.ipfs/swarm.key.old
sudo systemctl restart ipfs
# Restart ssb-server
# kill -9 $(ps auxf --sort=+utime | grep -w ssb-server| grep -v -E 'color=auto|grep' | tail -n 1 | awk '{print $2}')
# IPFS FILESYSTEM STRUCTURE
```
# ssb_INIT.sh
~/.zen/ipfs/.$ipfsnodeid/G1SSB/_ssb.whoami
~/.zen/ipfs/.$ipfsnodeid/G1SSB/_g1.pubkey
~/.zen/ipfs/.$ipfsnodeid/G1SSB/_g1.qrcode.png
~/.zen/ipfs/.${ipfsnodeid}/Addresses
~/.zen/ipfs/.${ipfsnodeid}/AgentVersion
~/.zen/ipfs/.${ipfsnodeid}/repo.stat
~/.zen/ipfs/.${ipfsnodeid}/tryme.addr
# zen_MAKE.sh
~/.zen/ipfs/.$ipfsnodeid/TAG/${J}
~/.zen/ipfs/.$ipfsnodeid/TAG/${J}/_tag.uid
~/.zen/ipfs/.$ipfsnodeid/TAG/${J}/_tag.passenger.filename
~/.zen/ipfs/.$ipfsnodeid/TAG/${J}/_tag.passenger.metadata.json
~/.zen/ipfs/.$ipfsnodeid/TAG/${J}/_tag.passenger.fulltitle
# ssb_SURVEY_contact.sh
~/.zen/ipfs/.${ipfsnodeid}/CONTACT/${g1author}
~/.zen/ipfs/.${ipfsnodeid}/CONTACT/${g1author}/ipfs_swarm.key.crypt
~/.zen/ipfs/.${ipfsnodeid}/Addresses
~/.zen/ipfs/.${ipfsnodeid}/AgentVersion
~/.zen/ipfs/.${ipfsnodeid}/repo.stat
~/.zen/ipfs/.${ipfsnodeid}/CHAN/sha256(id@channel)
# ipfs_SWARM_refresh.sh
```
# IPFS CHANNELS ARE IMPORTED FROM LOCAL NODE
```
~/.zen/ipfs/sha256(id@channel)/_uid
~/.zen/ipfs/sha256(+33647683646@SMS_+33667676767)/_uid
```
# natools CRYPT/DECRYPT
g1pub=$(cat ~/.ssb/secret.dunikey | grep 'pub:' | cut -d ' ' -f 2)
$MY_PATH/tools/natools.py encrypt -p $g1pub -i file -o file.crypt
$MY_PATH/tools/natools.py decrypt --pubsec -k ~/.ssb/secret.dunikey -i file.crypt -o file