aboutsummaryrefslogtreecommitdiffstats
path: root/cmd/puppeth/wizard_ethstats.go
blob: 1bde5a3fdbaadc8d7fdab4a20a233e8a4ffec2ea (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
// Copyright 2017 The go-ethereum Authors
// This file is part of go-ethereum.
//
// go-ethereum is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// go-ethereum is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with go-ethereum. If not, see <http://www.gnu.org/licenses/>.

package main

import (
    "fmt"
    "sort"

    "github.com/ethereum/go-ethereum/log"
)

// deployEthstats queries the user for various input on deploying an ethstats
// monitoring server, after which it executes it.
func (w *wizard) deployEthstats() {
    // Select the server to interact with
    server := w.selectServer()
    if server == "" {
        return
    }
    client := w.servers[server]

    // Retrieve any active ethstats configurations from the server
    infos, err := checkEthstats(client, w.network)
    if err != nil {
        infos = &ethstatsInfos{
            port:   80,
            host:   client.server,
            secret: "",
        }
    }
    // Figure out which port to listen on
    fmt.Println()
    fmt.Printf("Which port should ethstats listen on? (default = %d)\n", infos.port)
    infos.port = w.readDefaultInt(infos.port)

    // Figure which virtual-host to deploy ethstats on
    if infos.host, err = w.ensureVirtualHost(client, infos.port, infos.host); err != nil {
        log.Error("Failed to decide on ethstats host", "err", err)
        return
    }
    // Port and proxy settings retrieved, figure out the secret and boot ethstats
    fmt.Println()
    if infos.secret == "" {
        fmt.Printf("What should be the secret password for the API? (must not be empty)\n")
        infos.secret = w.readString()
    } else {
        fmt.Printf("What should be the secret password for the API? (default = %s)\n", infos.secret)
        infos.secret = w.readDefaultString(infos.secret)
    }
    // Gather any blacklists to ban from reporting
    fmt.Println()
    fmt.Printf("Keep existing IP %v blacklist (y/n)? (default = yes)\n", infos.banned)
    if w.readDefaultString("y") != "y" {
        // The user might want to clear the entire list, although generally probably not
        fmt.Println()
        fmt.Printf("Clear out blacklist and start over (y/n)? (default = no)\n")
        if w.readDefaultString("n") != "n" {
            infos.banned = nil
        }
        // Offer the user to explicitly add/remove certain IP addresses
        fmt.Println()
        fmt.Println("Which additional IP addresses should be blacklisted?")
        for {
            if ip := w.readIPAddress(); ip != "" {
                infos.banned = append(infos.banned, ip)
                continue
            }
            break
        }
        fmt.Println()
        fmt.Println("Which IP addresses should not be blacklisted?")
        for {
            if ip := w.readIPAddress(); ip != "" {
                for i, addr := range infos.banned {
                    if ip == addr {
                        infos.banned = append(infos.banned[:i], infos.banned[i+1:]...)
                        break
                    }
                }
                continue
            }
            break
        }
        sort.Strings(infos.banned)
    }
    // Try to deploy the ethstats server on the host
    fmt.Println()
    fmt.Printf("Should the ethstats be built from scratch (y/n)? (default = no)\n")
    nocache := w.readDefaultString("n") != "n"

    trusted := make([]string, 0, len(w.servers))
    for _, client := range w.servers {
        if client != nil {
            trusted = append(trusted, client.address)
        }
    }
    if out, err := deployEthstats(client, w.network, infos.port, infos.secret, infos.host, trusted, infos.banned, nocache); err != nil {
        log.Error("Failed to deploy ethstats container", "err", err)
        if len(out) > 0 {
            fmt.Printf("%s\n", out)
        }
        return
    }
    // All ok, run a network scan to pick any changes up
    w.networkStats()
}