- 23 Jun, 2015 3 commits
-
-
Jeromy authored
- add extra check to dialblock test - move filter to separate package - also improved tests - sunk filters down into p2p/net/conn/listener License: MIT Signed-off-by: Jeromy <jeromyj@gmail.com> Signed-off-by: Juan Batiz-Benet <juan@benet.ai>
-
Jeromy authored
License: MIT Signed-off-by: Jeromy <jeromyj@gmail.com>
-
Jeromy authored
License: MIT Signed-off-by: Jeromy <jeromyj@gmail.com>
-
- 18 Jun, 2015 1 commit
-
-
rht authored
Except when there is an explicit os.Exit(1) after the Critical line, then replace with Fatal{,f}. golang's log and logrus already call os.Exit(1) by default with Fatal. License: MIT Signed-off-by: rht <rhtbot@gmail.com>
-
- 08 Jun, 2015 1 commit
-
-
Juan Batiz-Benet authored
Different mutliaddrs is not enough. Nodes may share transports. NAT port mappings will likely only work on the base IP/TCP port pair. We go one step further, and require different root (IP) addrs. Just in case some NATs group by IP. In practice, this is what we want: use addresses only if hosts that are on different parts of the network have seen this address.
-
- 07 Jun, 2015 1 commit
-
-
Juan Batiz-Benet authored
If the same peer observed the same address twice, it would be double counted as different observations. This change adds a map to make sure we're counting each observer once. This is easily extended to require more than two observations, but i have not yet encountered NATs for whom this is relevant.
-
- 03 Jun, 2015 1 commit
-
-
rht authored
-
- 01 Jun, 2015 1 commit
-
-
Jeromy authored
-
- 29 May, 2015 1 commit
-
-
Juan Batiz-Benet authored
Cleanup tour
-
- 28 May, 2015 1 commit
-
-
Henry authored
upstream didn't respond to the request to update their dependencies
-
- 26 May, 2015 1 commit
-
-
rht authored
-
- 18 May, 2015 1 commit
-
-
rht authored
-
- 12 May, 2015 1 commit
-
-
Juan Batiz-Benet authored
We had a very nasty problem: handshakes were serial so incoming dials would wait for each other to finish handshaking. this was particularly problematic when handshakes hung-- nodes would not recover quickly. This led to gateways not bootstrapping peers fast enough. The approach taken here is to do what crypto/tls does: defer the handshake until Read/Write[1]. There are a number of reasons why this is _the right thing to do_: - it delays handshaking until it is known to be necessary (doing io) - it "accepts" before the handshake, getting the handshake out of the critical path entirely. - it defers to the user's parallelization of conn handling. users must implement this in some way already so use that, instead of picking constants surely to be wrong (how many handshakes to run in parallel?) [0] http://golang.org/src/crypto/tls/conn.go#L886
-
- 06 May, 2015 1 commit
-
-
Dominic Tarr authored
-
- 05 May, 2015 1 commit
-
-
Juan Batiz-Benet authored
quick fix for OOM panic that has been plaguing us
-
- 02 May, 2015 1 commit
-
-
Jeromy authored
-
- 01 May, 2015 2 commits
-
-
Juan Batiz-Benet authored
Fix/dial error hiding
-
Juan Batiz-Benet authored
advertise multiple addresses over mdns
-
- 30 Apr, 2015 1 commit
-
-
Jeromy Johnson authored
-
- 29 Apr, 2015 2 commits
- 28 Apr, 2015 4 commits
- 22 Apr, 2015 4 commits
-
-
Jeromy authored
-
Jeromy authored
-
Juan Batiz-Benet authored
-
Jeromy authored
-
- 20 Apr, 2015 1 commit
-
-
Juan Batiz-Benet authored
We now consider debugerrors harmful: we've run into cases where debugerror.Wrap() hid valuable error information (err == io.EOF?). I've removed them from the main code, but left them in some tests. Go errors are lacking, but unfortunately, this isn't the solution. It is possible that debugerros.New or debugerrors.Errorf should remain still (i.e. only remove debugerrors.Wrap) but we don't use these errors often enough to keep.
-
- 17 Apr, 2015 1 commit
-
-
Jeromy authored
-
- 14 Apr, 2015 1 commit
-
-
Juan Batiz-Benet authored
The same keys + nonces in secio were being observed. As described in https://github.com/ipfs/go-ipfs/issues/1016 -- the handshake must be talking to itself. This can happen in an outgoing TCP dial with REUSEPORT on to the same address.
-
- 12 Apr, 2015 1 commit
-
-
Jeromy authored
-
- 08 Apr, 2015 1 commit
-
-
Juan Batiz-Benet authored
reuseport is a hack. It is necessary for us to do certain kinds of tcp nat traversal. Ideally, reuseport would be available in go: https://github.com/golang/go/issues/9661 But until that issue is fixed, we're stuck with this. In some cases, reuseport is strictly a detriment: nodes are not NATed. This commit introduces an ENV var IPFS_REUSEPORT that can be set to false to avoid using reuseport entirely: IPFS_REUSEPORT=false ipfs daemon This approach addresses our current need. It could become a config var if necessary. If reuseport continues to give problems, we should look into improving it.
-
- 07 Apr, 2015 1 commit
-
-
Tor Arne Vestbø authored
-
- 01 Apr, 2015 1 commit
-
-
Jeromy authored
humanize bandwidth output instrument conn.Conn for bandwidth metrics add poll command for continuous bandwidth reporting move bandwidth tracking onto multiaddr net connections another mild refactor of recording locations address concerns from PR lower mock nodes in race test due to increased goroutines per connection
-
- 31 Mar, 2015 1 commit
-
-
Ho-Sheng Hsiao authored
- Modified Godeps/Godeps.json by hand - [TEST] Updated welcome docs hash to sharness - [TEST] Updated contact doc - [TEST] disabled breaking test (t0080-repo refs local)
-
- 07 Mar, 2015 1 commit
-
-
Juan Batiz-Benet authored
-
- 03 Mar, 2015 2 commits