1. 23 Jun, 2015 3 commits
  2. 18 Jun, 2015 1 commit
    • rht's avatar
      Replace Critical{,f} with Error{,f} · b1702b08
      rht authored
      
      
      Except when there is an explicit os.Exit(1) after the Critical line,
      then replace with Fatal{,f}.
      golang's log and logrus already call os.Exit(1) by default with Fatal.
      
      License: MIT
      Signed-off-by: default avatarrht <rhtbot@gmail.com>
      b1702b08
  3. 08 Jun, 2015 1 commit
    • Juan Batiz-Benet's avatar
      p2p/net/identify: clump addr observers into groups · f5a9795d
      Juan Batiz-Benet authored
      Different mutliaddrs is not enough. Nodes may share transports.
      NAT port mappings will likely only work on the base IP/TCP port
      pair. We go one step further, and require different root (IP)
      addrs. Just in case some NATs group by IP. In practice, this is
      what we want: use addresses only if hosts that are on different
      parts of the network have seen this address.
      f5a9795d
  4. 07 Jun, 2015 1 commit
    • Juan Batiz-Benet's avatar
      p2p/protocol/identify: dont double count observers · c754f210
      Juan Batiz-Benet authored
      If the same peer observed the same address twice, it would be
      double counted as different observations. This change adds a map
      to make sure we're counting each observer once.
      
      This is easily extended to require more than two observations,
      but i have not yet encountered NATs for whom this is relevant.
      c754f210
  5. 03 Jun, 2015 1 commit
  6. 01 Jun, 2015 1 commit
  7. 29 May, 2015 1 commit
  8. 28 May, 2015 1 commit
  9. 26 May, 2015 1 commit
  10. 18 May, 2015 1 commit
  11. 12 May, 2015 1 commit
    • Juan Batiz-Benet's avatar
      net/p2p + secio: parallelize crypto handshake · 95198430
      Juan Batiz-Benet authored
      We had a very nasty problem: handshakes were serial so incoming
      dials would wait for each other to finish handshaking. this was
      particularly problematic when handshakes hung-- nodes would not
      recover quickly. This led to gateways not bootstrapping peers
      fast enough.
      
      The approach taken here is to do what crypto/tls does:
      defer the handshake until Read/Write[1]. There are a number of
      reasons why this is _the right thing to do_:
      - it delays handshaking until it is known to be necessary (doing io)
      - it "accepts" before the handshake, getting the handshake out of the
        critical path entirely.
      - it defers to the user's parallelization of conn handling. users
        must implement this in some way already so use that, instead of
        picking constants surely to be wrong (how many handshakes to run
        in parallel?)
      
      [0] http://golang.org/src/crypto/tls/conn.go#L886
      95198430
  12. 06 May, 2015 1 commit
  13. 05 May, 2015 1 commit
  14. 02 May, 2015 1 commit
  15. 01 May, 2015 2 commits
  16. 30 Apr, 2015 1 commit
  17. 29 Apr, 2015 2 commits
  18. 28 Apr, 2015 4 commits
  19. 22 Apr, 2015 4 commits
  20. 20 Apr, 2015 1 commit
    • Juan Batiz-Benet's avatar
      remove debugerrors · b5957350
      Juan Batiz-Benet authored
      We now consider debugerrors harmful: we've run into cases where
      debugerror.Wrap() hid valuable error information (err == io.EOF?).
      I've removed them from the main code, but left them in some tests.
      Go errors are lacking, but unfortunately, this isn't the solution.
      
      It is possible that debugerros.New or debugerrors.Errorf should
      remain still (i.e. only remove debugerrors.Wrap) but we don't use
      these errors often enough to keep.
      b5957350
  21. 17 Apr, 2015 1 commit
  22. 14 Apr, 2015 1 commit
  23. 12 Apr, 2015 1 commit
  24. 08 Apr, 2015 1 commit
    • Juan Batiz-Benet's avatar
      reuseport: env var to turn it off · 9dbbe6db
      Juan Batiz-Benet authored
      reuseport is a hack. It is necessary for us to do certain kinds of
      tcp nat traversal. Ideally, reuseport would be available in go:
      
        https://github.com/golang/go/issues/9661
      
      But until that issue is fixed, we're stuck with this. In some cases,
      reuseport is strictly a detriment: nodes are not NATed. This commit
      introduces an ENV var IPFS_REUSEPORT that can be set to false to
      avoid using reuseport entirely:
      
        IPFS_REUSEPORT=false ipfs daemon
      
      This approach addresses our current need. It could become a config
      var if necessary. If reuseport continues to give problems, we should
      look into improving it.
      9dbbe6db
  25. 07 Apr, 2015 1 commit
  26. 01 Apr, 2015 1 commit
    • Jeromy's avatar
      bandwidth metering on streams · 44309cd5
      Jeromy authored
      humanize bandwidth output
      
      instrument conn.Conn for bandwidth metrics
      
      add poll command for continuous bandwidth reporting
      
      move bandwidth tracking onto multiaddr net connections
      
      another mild refactor of recording locations
      
      address concerns from PR
      
      lower mock nodes in race test due to increased goroutines per connection
      44309cd5
  27. 31 Mar, 2015 1 commit
  28. 07 Mar, 2015 1 commit
  29. 03 Mar, 2015 2 commits