Files
darkfi/bin/tau/taud/taud_config.toml

113 lines
3.3 KiB
TOML

## This is the tau daemon configuration file.
## Review it carefully.
## Datastore Path
#datastore = "~/.local/share/darkfi/taud_db"
## Sets DB logs replay datastore path
#replay_datastore = "~/.local/share/darkfi/replayed_taud_db"
## Run in replay mode to store Sled DB instructions
## (for eventgraph debugging tool)
#replay_mode = false
## Named pipe path
#pipe_path = "/tmp/tau_pipe"
## Whether to pipe notifications or not
#piped = false
## Current display name
#nickname = "NICKNAME"
## ====================
## Workspace settings
## ====================
##
## You can create a shared secret (read_key) with `taud --generate`.
## Never share this secret over unencrypted channels or with someone
## who you do not want to be able to read all the workspace's tasks.
## The write_public_key is used to verify task's authenticity the admin
## of workspace should generate and share it, while write_key is the
## private part and responsible for signing tasks and gaining write
## access, this, too, should not be shared with someone you don't
## want to add/edit tasks.
## Use it like this example:
#[workspace."foo"]
#read_key = "2bCqQTd8BJgeUzH7JQELZxjQuWS8aCmXZ9C6w7ktNS1v"
#write_public_key = "Fgsc8tep4KX3Rb2drq8RxMyrHFWQ7wZaZPpF9F3GQYFG"
#write_key = ""
[workspace."darkfi-dev"]
read_key = "F63KzWGXgUdEfHcjQ2o4C54qbD4vDik7zjY5pSHQMxv2"
write_public_key = "7iHFdGxe1DYyBtPLVFb7fXL3Kk495WtwRWaNxhYQTU9x"
# write_key = ""
# JSON-RPC settings
[rpc]
# JSON-RPC listen URL
rpc_listen = "tcp://127.0.0.1:23330"
# Disabled RPC methods
rpc_disabled_methods = ["p2p.get_info"]
# P2P network settings
[net]
# Path to the P2P datastore
p2p_datastore = "~/.local/share/darkfi/taud"
# Path to a configured hostlist for saving known peers
hostlist = "~/.local/share/darkfi/taud/hostlist.tsv"
## P2P accept addresses
#inbound = ["tcp+tls://0.0.0.0:23331", "tcp+tls://[::]:23331"]
#inbound = ["tor://127.0.0.1:23331"]
## Outbound connection slots
#outbound_connections = 8
## Inbound connection slots
#inbound_connections = 8
## White connection percent
#gold_connect_count = 2
## White connection percent
#white_connect_percent = 70
## Addresses we want to advertise to peers (optional)
## These should be reachable externally
#external_addrs = ["tcp+tls://my.resolveable.address:23331"]
## Seed nodes to connect to
seeds = [
"tcp+tls://lilith0.dark.fi:23331",
"tcp+tls://lilith1.dark.fi:23331",
#"tor://g7fxelebievvpr27w7gt24lflptpw3jeeuvafovgliq5utdst6xyruyd.onion:23332",
#"tor://yvklzjnfmwxhyodhrkpomawjcdvcaushsj6torjz2gyd7e25f3gfunyd.onion:23332",
]
## Manual peers to connect to
#peers = []
# Whitelisted transports for outbound connections
allowed_transports = ["tcp+tls"]
#allowed_transports = ["tor"]
#allowed_transports = ["tor", "tor+tls"]
# Transports you want to be mixed (e.g. Tor would be allowed to connect to `tcp://`
# if tcp is added to mixed_transports and tor is added to allowed_transports)
mixed_transports = []
# Tor Socks5 proxy
#tor_socks5_proxy = "socks5://127.0.0.1:9050"
# I2p Socks5 proxy
#i2p_socks5_proxy = "socks5://127.0.0.1:4447"
# Nodes to avoid interacting with for the duration of the program, in the
# format ["host", ["scheme", "scheme"], [port, port]].
# If scheme is left empty it will default to "tcp+tls".
# If ports are left empty all ports from this peer will be blocked.
#blacklist = [["example.com", ["tcp"], [8551, 23331]]]