lotus/node/repo/fsrepo.go

814 lines
18 KiB
Go
Raw Normal View History

package repo
import (
2020-05-27 08:13:06 +00:00
"bytes"
"context"
"encoding/json"
"fmt"
"io"
"os"
"path/filepath"
"strings"
2019-07-10 17:09:57 +00:00
"sync"
2023-11-14 00:06:11 +00:00
"github.com/BurntSushi/toml"
"github.com/ipfs/go-datastore"
fslock "github.com/ipfs/go-fs-lock"
logging "github.com/ipfs/go-log/v2"
2019-07-10 17:09:57 +00:00
"github.com/mitchellh/go-homedir"
"github.com/multiformats/go-base32"
"github.com/multiformats/go-multiaddr"
"golang.org/x/xerrors"
2023-11-14 00:06:11 +00:00
"github.com/filecoin-project/lotus/blockstore"
badgerbs "github.com/filecoin-project/lotus/blockstore/badger"
2022-06-14 15:00:51 +00:00
"github.com/filecoin-project/lotus/chain/types"
"github.com/filecoin-project/lotus/node/config"
"github.com/filecoin-project/lotus/storage/sealer/fsutil"
2022-11-01 11:01:31 +00:00
"github.com/filecoin-project/lotus/storage/sealer/storiface"
"github.com/filecoin-project/lotus/system"
)
const (
2020-03-05 19:21:06 +00:00
fsAPI = "api"
fsAPIToken = "token"
fsConfig = "config.toml"
2020-03-03 22:19:22 +00:00
fsStorageConfig = "storage.json"
2020-03-05 19:21:06 +00:00
fsDatastore = "datastore"
fsLock = "repo.lock"
fsKeystore = "keystore"
fsSqlite = "sqlite"
)
2022-02-10 16:33:38 +00:00
func NewRepoTypeFromString(t string) RepoType {
switch t {
case "FullNode":
return FullNode
2022-02-10 16:33:38 +00:00
case "StorageMiner":
return StorageMiner
2022-02-10 16:33:38 +00:00
case "Worker":
return Worker
2022-02-10 16:33:38 +00:00
case "Wallet":
2022-02-16 11:29:16 +00:00
return Wallet
2022-02-10 16:33:38 +00:00
default:
panic("unknown RepoType")
}
}
2022-02-10 16:33:38 +00:00
type RepoType interface {
Type() string
Config() interface{}
// APIFlags returns flags passed on the command line with the listen address
// of the API server (only used by the tests), in the order of precedence they
// should be applied for the requested kind of node.
APIFlags() []string
RepoFlags() []string
// APIInfoEnvVars returns the environment variables to use in order of precedence
// to determine the API endpoint of the specified node type.
//
// It returns the current variables and deprecated ones separately, so that
// the user can log a warning when deprecated ones are found to be in use.
APIInfoEnvVars() (string, []string, []string)
2022-02-10 16:33:38 +00:00
}
2022-02-16 12:28:00 +00:00
// SupportsStagingDeals is a trait for services that support staging deals
type SupportsStagingDeals interface {
SupportsStagingDeals()
}
var FullNode fullNode
type fullNode struct {
2022-02-10 16:33:38 +00:00
}
2022-02-16 12:28:00 +00:00
func (fullNode) Type() string {
2022-02-10 16:33:38 +00:00
return "FullNode"
}
2022-02-16 12:28:00 +00:00
func (fullNode) Config() interface{} {
2022-02-10 16:33:38 +00:00
return config.DefaultFullNode()
}
func (fullNode) APIFlags() []string {
return []string{"api-url"}
}
func (fullNode) RepoFlags() []string {
return []string{"repo"}
}
func (fullNode) APIInfoEnvVars() (primary string, fallbacks []string, deprecated []string) {
return "FULLNODE_API_INFO", nil, nil
}
var StorageMiner storageMiner
2022-02-16 12:28:00 +00:00
type storageMiner struct{}
2022-02-10 16:33:38 +00:00
2022-02-16 12:28:00 +00:00
func (storageMiner) SupportsStagingDeals() {}
func (storageMiner) Type() string {
2022-02-10 16:33:38 +00:00
return "StorageMiner"
}
2022-02-16 12:28:00 +00:00
func (storageMiner) Config() interface{} {
2022-02-10 16:33:38 +00:00
return config.DefaultStorageMiner()
}
func (storageMiner) APIFlags() []string {
return []string{"miner-api-url"}
}
func (storageMiner) RepoFlags() []string {
return []string{"miner-repo"}
}
func (storageMiner) APIInfoEnvVars() (primary string, fallbacks []string, deprecated []string) {
// TODO remove deprecated deprecation period
return "MINER_API_INFO", nil, []string{"STORAGE_API_INFO"}
}
var Markets markets
2022-02-16 12:28:00 +00:00
type markets struct{}
2022-02-10 16:33:38 +00:00
func (markets) SupportsStagingDeals() {}
2022-02-16 12:28:00 +00:00
func (markets) Type() string {
2022-02-10 16:33:38 +00:00
return "Markets"
}
2022-02-16 12:28:00 +00:00
func (markets) Config() interface{} {
2022-02-10 16:33:38 +00:00
return config.DefaultStorageMiner()
}
func (markets) APIFlags() []string {
// support split markets-miner and monolith deployments.
return []string{"markets-api-url", "miner-api-url"}
}
func (markets) RepoFlags() []string {
// support split markets-miner and monolith deployments.
return []string{"markets-repo", "miner-repo"}
}
func (markets) APIInfoEnvVars() (primary string, fallbacks []string, deprecated []string) {
// support split markets-miner and monolith deployments.
return "MARKETS_API_INFO", []string{"MINER_API_INFO"}, nil
}
type worker struct {
2022-02-10 16:33:38 +00:00
}
var Worker worker
2022-02-16 12:28:00 +00:00
func (worker) Type() string {
2022-02-10 16:33:38 +00:00
return "Worker"
}
2022-02-16 12:28:00 +00:00
func (worker) Config() interface{} {
2022-02-10 16:33:38 +00:00
return &struct{}{}
}
func (worker) APIFlags() []string {
return []string{"worker-api-url"}
}
func (worker) RepoFlags() []string {
return []string{"worker-repo"}
}
func (worker) APIInfoEnvVars() (primary string, fallbacks []string, deprecated []string) {
return "WORKER_API_INFO", nil, nil
}
type curio struct{}
2023-08-23 23:57:34 +00:00
var Curio curio
2023-08-23 23:57:34 +00:00
func (curio) Type() string {
return "Curio"
2023-08-23 23:57:34 +00:00
}
func (curio) Config() interface{} {
2023-08-23 23:57:34 +00:00
return &struct{}{}
}
func (curio) APIFlags() []string {
return []string{"curio-api-url"}
2023-08-23 23:57:34 +00:00
}
func (curio) RepoFlags() []string {
return []string{"curio-repo"}
2023-08-23 23:57:34 +00:00
}
func (curio) APIInfoEnvVars() (primary string, fallbacks []string, deprecated []string) {
return "CURIO_API_INFO", nil, nil
2023-08-23 23:57:34 +00:00
}
2022-02-16 11:29:16 +00:00
var Wallet wallet
type wallet struct {
2022-02-10 16:33:38 +00:00
}
2022-02-16 12:28:00 +00:00
func (wallet) Type() string {
2022-02-10 16:33:38 +00:00
return "Wallet"
}
2022-02-16 12:28:00 +00:00
func (wallet) Config() interface{} {
2022-02-10 16:33:38 +00:00
return &struct{}{}
}
func (wallet) APIFlags() []string {
panic("not supported")
}
func (wallet) RepoFlags() []string {
panic("not supported")
}
func (wallet) APIInfoEnvVars() (primary string, fallbacks []string, deprecated []string) {
panic("not supported")
}
2019-07-10 17:09:57 +00:00
var log = logging.Logger("repo")
2019-07-26 11:45:25 +00:00
var ErrRepoExists = xerrors.New("repo exists")
2019-07-10 17:09:57 +00:00
// FsRepo is struct for repo, use NewFS to create
type FsRepo struct {
2020-09-30 06:56:38 +00:00
path string
configPath string
}
var _ Repo = &FsRepo{}
// NewFS creates a repo instance based on a path on file system
func NewFS(path string) (*FsRepo, error) {
2019-07-10 17:09:57 +00:00
path, err := homedir.Expand(path)
if err != nil {
2019-07-10 17:36:17 +00:00
return nil, err
2019-07-10 17:09:57 +00:00
}
return &FsRepo{
2020-09-30 06:56:38 +00:00
path: path,
configPath: filepath.Join(path, fsConfig),
}, nil
}
2020-09-30 06:56:38 +00:00
func (fsr *FsRepo) SetConfigPath(cfgPath string) {
fsr.configPath = cfgPath
}
2019-07-23 21:54:54 +00:00
func (fsr *FsRepo) Exists() (bool, error) {
_, err := os.Stat(filepath.Join(fsr.path, fsDatastore))
2019-07-23 21:54:54 +00:00
notexist := os.IsNotExist(err)
if notexist {
err = nil
2020-09-05 19:36:32 +00:00
_, err = os.Stat(filepath.Join(fsr.path, fsKeystore))
notexist = os.IsNotExist(err)
if notexist {
err = nil
}
2019-07-23 21:54:54 +00:00
}
return !notexist, err
2019-07-19 09:23:24 +00:00
}
func (fsr *FsRepo) Init(t RepoType) error {
2019-07-30 23:18:21 +00:00
exist, err := fsr.Exists()
2020-03-05 19:21:06 +00:00
if err != nil {
2019-07-10 17:09:57 +00:00
return err
}
2019-07-30 23:18:21 +00:00
if exist {
return nil
}
2019-07-10 17:09:57 +00:00
log.Infof("Initializing repo at '%s'", fsr.path)
2020-09-14 08:49:35 +00:00
err = os.MkdirAll(fsr.path, 0755) //nolint: gosec
2019-07-30 23:18:21 +00:00
if err != nil && !os.IsExist(err) {
return err
}
if err := fsr.initConfig(t); err != nil {
return xerrors.Errorf("init config: %w", err)
}
return fsr.initKeystore()
}
func (fsr *FsRepo) initConfig(t RepoType) error {
2020-09-30 06:56:38 +00:00
_, err := os.Stat(fsr.configPath)
if err == nil {
// exists
return nil
} else if !os.IsNotExist(err) {
return err
}
2020-09-30 06:56:38 +00:00
c, err := os.Create(fsr.configPath)
2019-07-24 11:20:00 +00:00
if err != nil {
return err
}
2022-02-16 11:29:16 +00:00
comm, err := config.ConfigComment(t.Config())
if err != nil {
return xerrors.Errorf("comment: %w", err)
}
_, err = c.Write(comm)
if err != nil {
return xerrors.Errorf("write config: %w", err)
}
2019-07-10 17:09:57 +00:00
if err := c.Close(); err != nil {
return xerrors.Errorf("close config: %w", err)
}
return nil
}
func (fsr *FsRepo) initKeystore() error {
kstorePath := filepath.Join(fsr.path, fsKeystore)
if _, err := os.Stat(kstorePath); err == nil {
return ErrRepoExists
} else if !os.IsNotExist(err) {
return err
}
return os.Mkdir(kstorePath, 0700)
2019-07-10 17:09:57 +00:00
}
// APIEndpoint returns endpoint of API in this repo
func (fsr *FsRepo) APIEndpoint() (multiaddr.Multiaddr, error) {
p := filepath.Join(fsr.path, fsAPI)
2019-07-26 03:26:29 +00:00
f, err := os.Open(p)
if os.IsNotExist(err) {
2023-11-13 23:59:34 +00:00
return nil, xerrors.Errorf("No file (%s): %w", p, ErrNoAPIEndpoint)
} else if err != nil {
return nil, err
}
defer f.Close() //nolint: errcheck // Read only op
data, err := io.ReadAll(f)
if err != nil {
2019-07-26 11:45:25 +00:00
return nil, xerrors.Errorf("failed to read %q: %w", p, err)
}
strma := string(data)
strma = strings.TrimSpace(strma)
apima, err := multiaddr.NewMultiaddr(strma)
if err != nil {
return nil, err
}
return apima, nil
}
2019-07-23 18:49:09 +00:00
func (fsr *FsRepo) APIToken() ([]byte, error) {
p := filepath.Join(fsr.path, fsAPIToken)
f, err := os.Open(p)
if os.IsNotExist(err) {
return nil, ErrNoAPIEndpoint
} else if err != nil {
return nil, err
}
defer f.Close() //nolint: errcheck // Read only op
tb, err := io.ReadAll(f)
2020-05-27 08:13:06 +00:00
if err != nil {
return nil, err
}
return bytes.TrimSpace(tb), nil
2019-07-23 18:49:09 +00:00
}
// Lock acquires exclusive lock on this repo
func (fsr *FsRepo) Lock(repoType RepoType) (LockedRepo, error) {
locked, err := fslock.Locked(fsr.path, fsLock)
if err != nil {
return nil, xerrors.Errorf("could not check lock status: %w", err)
}
if locked {
return nil, ErrRepoAlreadyLocked
}
closer, err := fslock.Lock(fsr.path, fsLock)
if err != nil {
return nil, xerrors.Errorf("could not lock the repo: %w", err)
}
return &fsLockedRepo{
2020-09-30 06:56:38 +00:00
path: fsr.path,
configPath: fsr.configPath,
repoType: repoType,
closer: closer,
}, nil
}
// Like Lock, except datastores will work in read-only mode
func (fsr *FsRepo) LockRO(repoType RepoType) (LockedRepo, error) {
lr, err := fsr.Lock(repoType)
if err != nil {
return nil, err
}
lr.(*fsLockedRepo).readonly = true
return lr, nil
}
type fsLockedRepo struct {
2020-09-30 06:56:38 +00:00
path string
configPath string
repoType RepoType
closer io.Closer
readonly bool
2019-07-10 17:09:57 +00:00
ds map[string]datastore.Batching
dsErr error
dsOnce sync.Once
2020-03-09 19:22:30 +00:00
bs blockstore.Blockstore
bsErr error
bsOnce sync.Once
ssPath string
ssErr error
ssOnce sync.Once
sqlPath string
sqlErr error
sqlOnce sync.Once
2020-03-09 19:22:30 +00:00
storageLk sync.Mutex
configLk sync.Mutex
}
func (fsr *fsLockedRepo) RepoType() RepoType {
return fsr.repoType
}
func (fsr *fsLockedRepo) Readonly() bool {
return fsr.readonly
}
2019-07-12 09:59:18 +00:00
func (fsr *fsLockedRepo) Path() string {
return fsr.path
}
func (fsr *fsLockedRepo) Close() error {
err := os.Remove(fsr.join(fsAPI))
if err != nil && !os.IsNotExist(err) {
return xerrors.Errorf("could not remove API file: %w", err)
}
2019-09-17 14:34:22 +00:00
if fsr.ds != nil {
2020-07-06 20:03:37 +00:00
for _, ds := range fsr.ds {
if err := ds.Close(); err != nil {
return xerrors.Errorf("could not close datastore: %w", err)
}
2019-09-17 14:34:22 +00:00
}
}
// type assertion will return ok=false if fsr.bs is nil altogether.
if c, ok := fsr.bs.(io.Closer); ok && c != nil {
if err := c.Close(); err != nil {
return xerrors.Errorf("could not close blockstore: %w", err)
}
}
err = fsr.closer.Close()
fsr.closer = nil
return err
}
2020-11-01 13:50:41 +00:00
// Blockstore returns a blockstore for the provided data domain.
func (fsr *fsLockedRepo) Blockstore(ctx context.Context, domain BlockstoreDomain) (blockstore.Blockstore, error) {
if domain != UniversalBlockstore {
return nil, ErrInvalidBlockstoreDomain
}
fsr.bsOnce.Do(func() {
path := fsr.join(filepath.Join(fsDatastore, "chain"))
readonly := fsr.readonly
if err := os.MkdirAll(path, 0755); err != nil {
fsr.bsErr = err
return
}
opts, err := BadgerBlockstoreOptions(domain, path, readonly)
if err != nil {
fsr.bsErr = err
return
}
if system.BadgerFsyncDisable {
opts.SyncWrites = false
}
bs, err := badgerbs.Open(opts)
if err != nil {
fsr.bsErr = err
return
}
fsr.bs = blockstore.WrapIDStore(bs)
})
return fsr.bs, fsr.bsErr
}
func (fsr *fsLockedRepo) SplitstorePath() (string, error) {
fsr.ssOnce.Do(func() {
path := fsr.join(filepath.Join(fsDatastore, "splitstore"))
if err := os.MkdirAll(path, 0755); err != nil {
fsr.ssErr = err
return
}
fsr.ssPath = path
})
return fsr.ssPath, fsr.ssErr
}
func (fsr *fsLockedRepo) SqlitePath() (string, error) {
fsr.sqlOnce.Do(func() {
path := fsr.join(fsSqlite)
if err := os.MkdirAll(path, 0755); err != nil {
fsr.sqlErr = err
return
}
fsr.sqlPath = path
})
return fsr.sqlPath, fsr.sqlErr
}
// join joins path elements with fsr.path
func (fsr *fsLockedRepo) join(paths ...string) string {
return filepath.Join(append([]string{fsr.path}, paths...)...)
}
func (fsr *fsLockedRepo) stillValid() error {
if fsr.closer == nil {
return ErrClosedRepo
}
return nil
}
func (fsr *fsLockedRepo) Config() (interface{}, error) {
fsr.configLk.Lock()
defer fsr.configLk.Unlock()
return fsr.loadConfigFromDisk()
}
func (fsr *fsLockedRepo) loadConfigFromDisk() (interface{}, error) {
var opts []config.LoadCfgOpt
if fsr.repoType == FullNode {
opts = append(opts, config.SetCanFallbackOnDefault(config.NoDefaultForSplitstoreTransition))
opts = append(opts, config.SetValidate(config.ValidateSplitstoreSet))
}
opts = append(opts, config.SetDefault(func() (interface{}, error) {
return fsr.repoType.Config(), nil
}))
return config.FromFile(fsr.configPath, opts...)
}
func (fsr *fsLockedRepo) SetConfig(c func(interface{})) error {
if err := fsr.stillValid(); err != nil {
return err
}
fsr.configLk.Lock()
defer fsr.configLk.Unlock()
cfg, err := fsr.loadConfigFromDisk()
if err != nil {
return err
}
// mutate in-memory representation of config
c(cfg)
// buffer into which we write TOML bytes
buf := new(bytes.Buffer)
// encode now-mutated config as TOML and write to buffer
err = toml.NewEncoder(buf).Encode(cfg)
if err != nil {
return err
}
// write buffer of TOML bytes to config file
err = os.WriteFile(fsr.configPath, buf.Bytes(), 0644)
if err != nil {
return err
}
return nil
}
2022-11-01 11:01:31 +00:00
func (fsr *fsLockedRepo) GetStorage() (storiface.StorageConfig, error) {
2020-03-09 19:22:30 +00:00
fsr.storageLk.Lock()
defer fsr.storageLk.Unlock()
2020-03-09 21:46:17 +00:00
return fsr.getStorage(nil)
2020-03-09 19:22:30 +00:00
}
2022-11-01 11:01:31 +00:00
func (fsr *fsLockedRepo) getStorage(def *storiface.StorageConfig) (storiface.StorageConfig, error) {
2020-03-09 21:46:17 +00:00
c, err := config.StorageFromFile(fsr.join(fsStorageConfig), def)
2020-03-03 22:19:22 +00:00
if err != nil {
2022-11-01 11:01:31 +00:00
return storiface.StorageConfig{}, err
2020-03-03 22:19:22 +00:00
}
return *c, nil
}
2022-11-01 11:01:31 +00:00
func (fsr *fsLockedRepo) SetStorage(c func(*storiface.StorageConfig)) error {
2020-03-09 19:22:30 +00:00
fsr.storageLk.Lock()
defer fsr.storageLk.Unlock()
2022-11-01 11:01:31 +00:00
sc, err := fsr.getStorage(&storiface.StorageConfig{})
2020-03-09 19:22:30 +00:00
if err != nil {
return xerrors.Errorf("get storage: %w", err)
}
c(&sc)
return config.WriteStorageFile(fsr.join(fsStorageConfig), sc)
2020-03-03 22:19:22 +00:00
}
2020-07-08 15:23:27 +00:00
func (fsr *fsLockedRepo) Stat(path string) (fsutil.FsStat, error) {
return fsutil.Statfs(path)
}
func (fsr *fsLockedRepo) DiskUsage(path string) (int64, error) {
si, err := fsutil.FileSize(path)
if err != nil {
return 0, err
}
return si.OnDisk, nil
}
func (fsr *fsLockedRepo) SetAPIEndpoint(ma multiaddr.Multiaddr) error {
if err := fsr.stillValid(); err != nil {
return err
}
return os.WriteFile(fsr.join(fsAPI), []byte(ma.String()), 0644)
}
2019-07-23 18:49:09 +00:00
func (fsr *fsLockedRepo) SetAPIToken(token []byte) error {
if err := fsr.stillValid(); err != nil {
return err
}
return os.WriteFile(fsr.join(fsAPIToken), token, 0600)
2019-07-23 18:49:09 +00:00
}
func (fsr *fsLockedRepo) KeyStore() (types.KeyStore, error) {
if err := fsr.stillValid(); err != nil {
return nil, err
}
return fsr, nil
}
var kstrPermissionMsg = "permissions of key: '%s' are too relaxed, " +
"required: 0600, got: %#o"
// List lists all the keys stored in the KeyStore
func (fsr *fsLockedRepo) List() ([]string, error) {
if err := fsr.stillValid(); err != nil {
return nil, err
}
kstorePath := fsr.join(fsKeystore)
dir, err := os.Open(kstorePath)
if err != nil {
return nil, xerrors.Errorf("opening dir to list keystore: %w", err)
}
2020-07-23 10:21:13 +00:00
defer dir.Close() //nolint:errcheck
files, err := dir.Readdir(-1)
if err != nil {
return nil, xerrors.Errorf("reading keystore dir: %w", err)
}
keys := make([]string, 0, len(files))
for _, f := range files {
if f.Mode()&0077 != 0 {
return nil, xerrors.Errorf(kstrPermissionMsg, f.Name(), f.Mode())
}
name, err := base32.RawStdEncoding.DecodeString(f.Name())
if err != nil {
return nil, xerrors.Errorf("decoding key: '%s': %w", f.Name(), err)
}
keys = append(keys, string(name))
}
return keys, nil
}
// Get gets a key out of keystore and returns types.KeyInfo coresponding to named key
func (fsr *fsLockedRepo) Get(name string) (types.KeyInfo, error) {
if err := fsr.stillValid(); err != nil {
return types.KeyInfo{}, err
}
encName := base32.RawStdEncoding.EncodeToString([]byte(name))
keyPath := fsr.join(fsKeystore, encName)
fstat, err := os.Stat(keyPath)
if os.IsNotExist(err) {
return types.KeyInfo{}, xerrors.Errorf("opening key '%s': %w", name, types.ErrKeyInfoNotFound)
} else if err != nil {
return types.KeyInfo{}, xerrors.Errorf("opening key '%s': %w", name, err)
}
if fstat.Mode()&0077 != 0 {
return types.KeyInfo{}, xerrors.Errorf(kstrPermissionMsg, name, fstat.Mode())
}
file, err := os.Open(keyPath)
if err != nil {
return types.KeyInfo{}, xerrors.Errorf("opening key '%s': %w", name, err)
}
defer file.Close() //nolint: errcheck // read only op
data, err := io.ReadAll(file)
if err != nil {
return types.KeyInfo{}, xerrors.Errorf("reading key '%s': %w", name, err)
}
var res types.KeyInfo
err = json.Unmarshal(data, &res)
if err != nil {
return types.KeyInfo{}, xerrors.Errorf("decoding key '%s': %w", name, err)
}
return res, nil
}
const KTrashPrefix = "trash-"
// Put saves key info under given name
func (fsr *fsLockedRepo) Put(name string, info types.KeyInfo) error {
return fsr.put(name, info, 0)
}
func (fsr *fsLockedRepo) put(rawName string, info types.KeyInfo, retries int) error {
if err := fsr.stillValid(); err != nil {
return err
}
name := rawName
if retries > 0 {
name = fmt.Sprintf("%s-%d", rawName, retries)
}
encName := base32.RawStdEncoding.EncodeToString([]byte(name))
keyPath := fsr.join(fsKeystore, encName)
_, err := os.Stat(keyPath)
if err == nil && strings.HasPrefix(name, KTrashPrefix) {
// retry writing the trash-prefixed file with a number suffix
return fsr.put(rawName, info, retries+1)
} else if err == nil {
2019-10-18 11:39:31 +00:00
return xerrors.Errorf("checking key before put '%s': %w", name, types.ErrKeyExists)
} else if !os.IsNotExist(err) {
return xerrors.Errorf("checking key before put '%s': %w", name, err)
}
keyData, err := json.Marshal(info)
if err != nil {
return xerrors.Errorf("encoding key '%s': %w", name, err)
}
err = os.WriteFile(keyPath, keyData, 0600)
if err != nil {
return xerrors.Errorf("writing key '%s': %w", name, err)
}
return nil
}
func (fsr *fsLockedRepo) Delete(name string) error {
if err := fsr.stillValid(); err != nil {
return err
}
encName := base32.RawStdEncoding.EncodeToString([]byte(name))
keyPath := fsr.join(fsKeystore, encName)
_, err := os.Stat(keyPath)
if os.IsNotExist(err) {
return xerrors.Errorf("checking key before delete '%s': %w", name, types.ErrKeyInfoNotFound)
} else if err != nil {
return xerrors.Errorf("checking key before delete '%s': %w", name, err)
}
err = os.Remove(keyPath)
if err != nil {
return xerrors.Errorf("deleting key '%s': %w", name, err)
}
return nil
}