The js-ipfs config file is a JSON document located in the root directory of the js-ipfs repository.
Configuration profiles allow to tweak configuration quickly. Profiles can be
applied with --profile
flag to ipfs init
or with the ipfs config profile apply
command. When a profile is applied a backup of the configuration file
will be created in $IPFS_PATH
.
Available profiles:
-
server
Recommended for nodes with public IPv4 address (servers, VPSes, etc.), disables host and content discovery in local networks.
-
local-discovery
Sets default values to fields affected by
server
profile, enables discovery in local networks. -
test
Reduces external interference, useful for running ipfs in test environments. Note that with these settings node won't be able to talk to the rest of the network without manual bootstrap.
-
default-networking
Restores default network settings. Inverse profile of the
test
profile. -
lowpower
Reduces daemon overhead on the system. May affect node functionality, performance of content discovery and data fetching may be degraded.
-
default-power
Inverse of "lowpower" profile.
Contains information about various listener addresses to be used by this node.
The IPFS daemon exposes an HTTP API that allows to control the node and run the same commands as you can do from the command line. It is defined on the HTTP API Spec.
Multiaddr or array of Multiaddr describing the address(es) to serve the HTTP API on.
Default: /ip4/127.0.0.1/tcp/5002
Delegate peers are used to find peers and retrieve content from the network on your behalf.
Array of Multiaddr describing which addresses to use as delegate nodes.
Default: []
A gateway is exposed by the IPFS daemon, which allows an easy way to access content from IPFS, using an IPFS path.
Multiaddr or array of Multiaddr describing the address(es) to serve the gateway on.
Default: /ip4/127.0.0.1/tcp/9090
Array of Multiaddr describing which addresses to listen on for p2p swarm connections.
Default:
[
"/ip4/0.0.0.0/tcp/4002",
"/ip4/127.0.0.1/tcp/4003/ws"
]
Bootstrap is an array of Multiaddr of trusted nodes to connect to in order to initiate a connection to the network.
Contains information related to the construction and operation of the on-disk storage system.
Spec defines the structure of the IPFS datastore. It is a composable structure, where each datastore is represented by a JSON object. Datastores can wrap other datastores to provide extra functionality (e.g. metrics, logging, or caching).
This can be changed manually, however, if you make any changes that require a different on-disk structure, you will need to run the ipfs-ds-convert tool to migrate data into the new structures.
Default:
{
"mounts": [
{
"child": {
"path": "blocks",
"shardFunc": "/repo/flatfs/shard/v1/next-to-last/2",
"sync": true,
"type": "flatfs"
},
"mountpoint": "/blocks",
"prefix": "flatfs.datastore",
"type": "measure"
},
{
"child": {
"compression": "none",
"path": "datastore",
"type": "levelds"
},
"mountpoint": "/",
"prefix": "leveldb.datastore",
"type": "measure"
}
],
"type": "mount"
}
Contains options for configuring IPFS node discovery mechanisms.
Multicast DNS is a discovery protocol that is able to find other peers on the local network.
Options for Multicast DNS peer discovery:
-
Enabled
A boolean value for whether or not MDNS should be active.
Default:
true
-
Interval
A number of seconds to wait between discovery checks.
Default:
10
WebRTCStar is a discovery mechanism prvided by a signalling-star that allows peer-to-peer communications in the browser.
Options for webRTCstar peer discovery:
-
Enabled
A boolean value for whether or not webRTCStar should be active.
Default:
true
The unique PKI identity label for this configs peer. Set on init and never read, its merely here for convenience. IPFS will always generate the peerID from its keypair at runtime.
The base64 encoded protobuf describing (and containing) the nodes private key.
We can customize the key management and criptographically protected messages by changing the Keychain options. Those options are used for generating the derived encryption key (DEK
). The DEK
object, along with the passPhrase, is the input to a PBKDF2 function.
Default:
{
"dek": {
"keyLength": 512/8,
"iterationCount": 1000,
"salt": "at least 16 characters long",
"hash": "sha2-512"
}
}
You can check the parameter choice for pbkdf2 for more information.
Options for configuring the pubsub subsystem. It is important pointing out that this is not supported in the browser. If you want to configure a different pubsub router in the browser you must configure libp2p.modules.pubsub
options instead.
A string value for specifying which pubsub routing protocol to use. You can either use gossipsub
in order to use the ChainSafe/gossipsub-js implementation, or floodsub
to use the libp2p/js-libp2p-floodsub implementation. You can read more about these implementations on the libp2p/specs/pubsub document.
Default: gossipsub
A boolean value for wether or not pubsub router should be active.
Default: true
Options for configuring the swarm.
The connection manager determines which and how many connections to keep and can be configured to keep.
-
LowWater
The minimum number of connections to maintain.
Default:
200
(both browser and node.js) -
HighWater
The number of connections that, when exceeded, will trigger a connection GC operation.
Default:
500
(both browser and node.js)
The "basic" connection manager tries to keep between LowWater
and HighWater
connections. It works by:
- Keeping all connections until
HighWater
connections is reached. - Once
HighWater
is reached, it closes connections untilLowWater
is reached.
{
"Swarm": {
"ConnMgr": {
"LowWater": 100,
"HighWater": 200,
}
}
}
Settings applied to the HTTP RPC API server
HTTP header settings used by the HTTP RPC API server
The RPC API endpoints running on your local node are protected by the Cross-Origin Resource Sharing mechanism.
When a request is made that sends an Origin
header, that Origin must be present in the allowed origins configured for the node, otherwise the browser will disallow that request to proceed, unless mode: 'no-cors'
is set on the request, in which case the response will be opaque.
To allow requests from web browsers, configure the API.HTTPHeaders.Access-Control-Allow-Origin
setting. This is an array of URL strings with safelisted Origins.
If you are running a webapp locally that you access via the URL http://127.0.0.1:3000
, you must add it to the list of allowed origins in order to make API requests from that webapp in the browser:
{
"API": {
"HTTPHeaders": {
"Access-Control-Allow-Origin": [
"http://127.0.0.1:3000"
]
}
}
}
Note that the origin must match exactly so 'http://127.0.0.1:3000'
is treated differently to 'http://127.0.0.1:3000/'
The Access-Control-Allow-Credentials header allows client-side JavaScript running in the browser to send and receive credentials with requests - cookies, auth headers or TLS certificates.
For most applications this will not be necessary but if you require this to be set, see the example below for how to configure it.
{
"API": {
"HTTPHeaders": {
"Access-Control-Allow-Credentials": true
}
}
}